https://bz.apache.org/bugzilla/show_bug.cgi?id=69486

--- Comment #5 from Christopher Schultz <[email protected]> ---
(In reply to Chen Jp from comment #4)
> [...] may very helpful to avoiding potential data leak.

Please give a hypothetical situation where data leakage can occur which does
not require exploiting the JVM.

> Next request/response cycle will not able to obtains context of previous
> service round.

ByteBuffer.limit(0) already does this.

-- 
You are receiving this mail because:
You are the assignee for the bug.
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to