You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@qpid.apache.org by "Steve Huston (JIRA)" <qp...@incubator.apache.org> on 2010/02/15 17:49:28 UTC

[jira] Created: (QPID-2407) C++ SSL session can get bad buffer management

C++ SSL session can get bad buffer management
---------------------------------------------

                 Key: QPID-2407
                 URL: https://issues.apache.org/jira/browse/QPID-2407
             Project: Qpid
          Issue Type: Bug
          Components: C++ Broker, C++ Client
    Affects Versions: 0.7
         Environment: Windows
            Reporter: Steve Huston
            Assignee: Steve Huston


Thanks to Cliff Jansen for alerting me to this problem.

It's possible for an SSL-negotiated session on Windows to end up with odd errors or an exception. One session I caught in the debugger ended with a ENOBUFS errors on a network receive; the buffer involved ended up having a data-start greater than the length of the buffer, and the calculated receive length for the operation was a negative value.

Can be reproduced using perftest on Windows; I ran against a Linux broker, but similar results can probably happen in either direction depending on the traffic pattern.

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.


---------------------------------------------------------------------
Apache Qpid - AMQP Messaging Implementation
Project:      http://qpid.apache.org
Use/Interact: mailto:dev-subscribe@qpid.apache.org


[jira] Resolved: (QPID-2407) C++ SSL session can get bad buffer management

Posted by "Steve Huston (JIRA)" <qp...@incubator.apache.org>.
     [ https://issues.apache.org/jira/browse/QPID-2407?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Steve Huston resolved QPID-2407.
--------------------------------

       Resolution: Fixed
    Fix Version/s: 0.7

Problem happened when large chunks of coalesced SSL segments came in - sometimes the buffer obtained tohold the extra wasn't large enough; data got overrun, counts got calculated incorrectly, and odd things ensued.
Fixed on trunk r910338.


> C++ SSL session can get bad buffer management
> ---------------------------------------------
>
>                 Key: QPID-2407
>                 URL: https://issues.apache.org/jira/browse/QPID-2407
>             Project: Qpid
>          Issue Type: Bug
>          Components: C++ Broker, C++ Client
>    Affects Versions: 0.7
>         Environment: Windows
>            Reporter: Steve Huston
>            Assignee: Steve Huston
>             Fix For: 0.7
>
>
> Thanks to Cliff Jansen for alerting me to this problem.
> It's possible for an SSL-negotiated session on Windows to end up with odd errors or an exception. One session I caught in the debugger ended with a ENOBUFS errors on a network receive; the buffer involved ended up having a data-start greater than the length of the buffer, and the calculated receive length for the operation was a negative value.
> Can be reproduced using perftest on Windows; I ran against a Linux broker, but similar results can probably happen in either direction depending on the traffic pattern.

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.


---------------------------------------------------------------------
Apache Qpid - AMQP Messaging Implementation
Project:      http://qpid.apache.org
Use/Interact: mailto:dev-subscribe@qpid.apache.org