[ 
https://issues.apache.org/jira/browse/QPID-8583?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17521593#comment-17521593
 ] 

ASF GitHub Bot commented on QPID-8583:
--------------------------------------

dakirily opened a new pull request, #124:
URL: https://github.com/apache/qpid-broker-j/pull/124

   This PR addresses JIRA 
[QPID-8583](https://issues.apache.org/jira/browse/QPID-8583), improving 
resistance against the heap introspection.




> [Broker-J] Privacy Violation: Heap Inspection
> ---------------------------------------------
>
>                 Key: QPID-8583
>                 URL: https://issues.apache.org/jira/browse/QPID-8583
>             Project: Qpid
>          Issue Type: Improvement
>          Components: Broker-J
>    Affects Versions: qpid-java-broker-8.0.6
>            Reporter: Daniil Kirilyuk
>            Priority: Minor
>
> Sensitive data (such as passwords) stored in memory can be leaked if memory 
> is not cleared after use. Often, Strings are used store sensitive data, 
> however, since String objects are immutable, removing the value of a String 
> from memory can only be done by the JVM garbage collector. The garbage 
> collector is not required to run unless the JVM is low on memory, so there is 
> no guarantee as to when garbage collection will take place. In the event of 
> an application crash, a memory dump of the application might reveal sensitive 
> data.
> There are several classes susceptible to this issue (e.g. 
> ConfiguredObjectMethodAttribute, ConfiguredDerivedInjectedAttribute, 
> ConfiguredSettableInjectedAttribute, CramMd5Base64HexNegotiator, 
> CramMd5Base64HashedNegotiator).



--
This message was sent by Atlassian Jira
(v8.20.1#820001)

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to