qpid-proton mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Ken Giusti (JIRA)" <j...@apache.org>
Subject [jira] [Updated] (PROTON-537) [proton-c] Pointer corruption in SSL buffer handling logic.
Date Mon, 17 Mar 2014 15:23:42 GMT

     [ https://issues.apache.org/jira/browse/PROTON-537?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]

Ken Giusti updated PROTON-537:
------------------------------

          Component/s: proton-c
    Affects Version/s: 0.6
        Fix Version/s: 0.7

> [proton-c] Pointer corruption in SSL buffer handling logic.
> -----------------------------------------------------------
>
>                 Key: PROTON-537
>                 URL: https://issues.apache.org/jira/browse/PROTON-537
>             Project: Qpid Proton
>          Issue Type: Bug
>          Components: proton-c
>    Affects Versions: 0.6
>            Reporter: Ken Giusti
>            Assignee: Ken Giusti
>             Fix For: 0.7
>
>
> Found by running Coverity Scan.
> If the application's input buffer is too small, the SSL layer will expand it as necessary.
 During the expansion the data tracking pointer is not reset to the new memory buffer, causing
a de-reference of an invalid pointer.



--
This message was sent by Atlassian JIRA
(v6.2#6252)

Mime
View raw message