THIS IS AN AUTOMATED MESSAGE, DO NOT REPLY.
The following task has a new comment added:
FS#185 - textopsx:msg_apply_changes() can corrupt incoming TCP message buffer
User who did this - Daniel-Constantin Mierla (miconda)
----------
I went for a different approach, cloning the content from TCP stream in a local buffer
before calling receive_msg() -- this will ensure same behavior as for udp and sctp. Topoh
module does also changes in the buffer, so this solution should make all safe, without
touching textopsx, topoh or tm.
Had no time/environment for test quickly, if you can do it and report if all is fine, then
will great and will speed up backporting.
Here is the link to commit in master branch:
http://git.sip-router.org/cgi-bin/gitweb.cgi/sip-router/?a=commit;h=6ebd0a6…
----------
More information can be found at the following URL:
http://sip-router.org/tracker/index.php?do=details&task_id=185#comment4…
You are receiving this message because you have requested it from the Flyspray bugtracking
system. If you did not expect this message or don't want to receive mails in future,
you can change your notification settings at the URL shown above.