You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@qpid.apache.org by "Steve Huston (JIRA)" <qp...@incubator.apache.org> on 2010/02/15 17:49:28 UTC
[jira] Created: (QPID-2407) C++ SSL session can get bad buffer
management
C++ SSL session can get bad buffer management
---------------------------------------------
Key: QPID-2407
URL: https://issues.apache.org/jira/browse/QPID-2407
Project: Qpid
Issue Type: Bug
Components: C++ Broker, C++ Client
Affects Versions: 0.7
Environment: Windows
Reporter: Steve Huston
Assignee: Steve Huston
Thanks to Cliff Jansen for alerting me to this problem.
It's possible for an SSL-negotiated session on Windows to end up with odd errors or an exception. One session I caught in the debugger ended with a ENOBUFS errors on a network receive; the buffer involved ended up having a data-start greater than the length of the buffer, and the calculated receive length for the operation was a negative value.
Can be reproduced using perftest on Windows; I ran against a Linux broker, but similar results can probably happen in either direction depending on the traffic pattern.
--
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.
---------------------------------------------------------------------
Apache Qpid - AMQP Messaging Implementation
Project: http://qpid.apache.org
Use/Interact: mailto:dev-subscribe@qpid.apache.org
[jira] Resolved: (QPID-2407) C++ SSL session can get bad buffer
management
Posted by "Steve Huston (JIRA)" <qp...@incubator.apache.org>.
[ https://issues.apache.org/jira/browse/QPID-2407?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Steve Huston resolved QPID-2407.
--------------------------------
Resolution: Fixed
Fix Version/s: 0.7
Problem happened when large chunks of coalesced SSL segments came in - sometimes the buffer obtained tohold the extra wasn't large enough; data got overrun, counts got calculated incorrectly, and odd things ensued.
Fixed on trunk r910338.
> C++ SSL session can get bad buffer management
> ---------------------------------------------
>
> Key: QPID-2407
> URL: https://issues.apache.org/jira/browse/QPID-2407
> Project: Qpid
> Issue Type: Bug
> Components: C++ Broker, C++ Client
> Affects Versions: 0.7
> Environment: Windows
> Reporter: Steve Huston
> Assignee: Steve Huston
> Fix For: 0.7
>
>
> Thanks to Cliff Jansen for alerting me to this problem.
> It's possible for an SSL-negotiated session on Windows to end up with odd errors or an exception. One session I caught in the debugger ended with a ENOBUFS errors on a network receive; the buffer involved ended up having a data-start greater than the length of the buffer, and the calculated receive length for the operation was a negative value.
> Can be reproduced using perftest on Windows; I ran against a Linux broker, but similar results can probably happen in either direction depending on the traffic pattern.
--
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.
---------------------------------------------------------------------
Apache Qpid - AMQP Messaging Implementation
Project: http://qpid.apache.org
Use/Interact: mailto:dev-subscribe@qpid.apache.org