Page MenuHomePhabricator
Feed Advanced Search

Jun 29 2017

matvey added a comment to T651: Tor Browser 7.0a2 broken in stretch based Whonix 14 - <jemalloc>: Corrupt redzone 0 bytes after 0x7f0503ede9d0 (size 80), byte=0x0.

The main problem at the level of software errors is that the "simplification of memory allocation" undertaken by the developers of the browser in version 6.56a seems to give the error of the memory leaks during the integrity check procedure on the bug tracker, they will indicate "memory hardening" - as additional memory protection mechanisms Including interference with environment variables LD_PRELOAD and LD_LIBRARY_PATH)

Jun 29 2017, 5:19 PM · Whonix, research, Whonix 14