You are viewing a plain text version of this content. The canonical link for it is here.
Posted to proton@qpid.apache.org by "Ken Giusti (JIRA)" <ji...@apache.org> on 2014/03/17 15:51:43 UTC

[jira] [Created] (PROTON-537) [proton-c] Pointer corruption in SSL buffer handling logic.

Ken Giusti created PROTON-537:
---------------------------------

             Summary: [proton-c] Pointer corruption in SSL buffer handling logic.
                 Key: PROTON-537
                 URL: https://issues.apache.org/jira/browse/PROTON-537
             Project: Qpid Proton
          Issue Type: Bug
            Reporter: Ken Giusti


Found by running Coverity Scan.

If the application's input buffer is too small, the SSL layer will expand it as necessary.  During the expansion the data tracking pointer is not reset to the new memory buffer, causing a de-reference of an invalid pointer.




--
This message was sent by Atlassian JIRA
(v6.2#6252)