Skip to content

Conversation

@github-actions
Copy link
Contributor

@github-actions github-actions bot commented Sep 6, 2024

Backport of #107431 to release/9.0

/cc @vcsjones

Customer Impact

  • Customer reported
  • Found internally

The one-shot implementation of KMAC had a native memory leak, an EVP_MAC_CTX. Customers using the static HashData on Kmac128, KmacXof128, or their 256-bit counterparts, will see a slow increase in memory that will never be freed.

Regression

  • Yes
  • No

This functionality is new in .NET 9.0.

Testing

The existing tests verify that it works as expected. Manually verified that unbound memory growth is no longer observed.

Risk

Low. Adds a missing EVP_MAC_CTX_free to all code paths.

@ghost ghost added the area-System.Security label Sep 6, 2024
@dotnet-policy-service
Copy link
Contributor

Tagging subscribers to this area: @dotnet/area-system-security, @bartonjs, @vcsjones
See info in area-owners.md if you want to be subscribed.

@vcsjones vcsjones added this to the 9.0.0 milestone Sep 6, 2024
@bartonjs bartonjs added Servicing-consider Issue for next servicing release review Servicing-approved Approved for servicing release and removed Servicing-consider Issue for next servicing release review labels Sep 6, 2024
@jeffhandley jeffhandley requested a review from artl93 September 9, 2024 18:23
@jeffhandley
Copy link
Member

@artl93 - This flowed through Tactics last week and was approved. Please review and merge when ready.

@artl93 artl93 merged commit c608194 into release/9.0 Sep 9, 2024
@vcsjones vcsjones deleted the backport/pr-107431-to-release/9.0 branch September 9, 2024 20:56
@github-actions github-actions bot locked and limited conversation to collaborators Oct 10, 2024
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

area-System.Security Servicing-approved Approved for servicing release

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants