[ 
https://issues.apache.org/jira/browse/PROTON-537?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Ken Giusti updated PROTON-537:
------------------------------

          Component/s: proton-c
    Affects Version/s: 0.6
        Fix Version/s: 0.7

> [proton-c] Pointer corruption in SSL buffer handling logic.
> -----------------------------------------------------------
>
>                 Key: PROTON-537
>                 URL: https://issues.apache.org/jira/browse/PROTON-537
>             Project: Qpid Proton
>          Issue Type: Bug
>          Components: proton-c
>    Affects Versions: 0.6
>            Reporter: Ken Giusti
>            Assignee: Ken Giusti
>             Fix For: 0.7
>
>
> Found by running Coverity Scan.
> If the application's input buffer is too small, the SSL layer will expand it 
> as necessary.  During the expansion the data tracking pointer is not reset to 
> the new memory buffer, causing a de-reference of an invalid pointer.



--
This message was sent by Atlassian JIRA
(v6.2#6252)

Reply via email to