THIS IS AN AUTOMATED MESSAGE, DO NOT REPLY.

The following task has a new comment added:

FS#185 - textopsx:msg_apply_changes() can corrupt incoming TCP message buffer
User who did this - Daniel-Constantin Mierla (miconda)

----------
I went for a different approach, cloning the content from TCP stream in a local 
buffer before calling receive_msg() -- this will ensure same behavior as for 
udp and sctp. Topoh module does also changes in the buffer, so this solution 
should make all safe, without touching textopsx, topoh or tm.

Had no time/environment for test quickly, if you can do it and report if all is 
fine, then will great and will speed up backporting.

Here is the link to commit in master branch:

http://git.sip-router.org/cgi-bin/gitweb.cgi/sip-router/?a=commit;h=6ebd0a6bf1cbacf73f45ff42d368f22304bff11b
----------

More information can be found at the following URL:
http://sip-router.org/tracker/index.php?do=details&task_id=185#comment452

You are receiving this message because you have requested it from the Flyspray 
bugtracking system.  If you did not expect this message or don't want to 
receive mails in future, you can change your notification settings at the URL 
shown above.

_______________________________________________
sr-dev mailing list
[email protected]
http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-dev

Reply via email to