jio_vsnprintf() should check buffer size as a safe guard

XMLWordPrintable

    • Type: Bug
    • Resolution: Fixed
    • Priority: P3
    • 1.3.1
    • Affects Version/s: 1.2.2, 1.3.0
    • Component/s: hotspot
    • None
    • rc1
    • generic, x86
    • generic, linux

        As seen in bug 4399518, VM crashes on Linux due to native libraries passing
        in negative buffer size, which is illegal. VM can avoid this by casting buffer
        size to signed integer and checking if it's negative before calling the
        standard vsnprintf() in C library. This is a workaround for 4399518 and
        can prevent similar buffer overrun problems in the future.

              Assignee:
              Hui Huang (Inactive)
              Reporter:
              Hui Huang (Inactive)
              Votes:
              0 Vote for this issue
              Watchers:
              0 Start watching this issue

                Created:
                Updated:
                Resolved:
                Imported:
                Indexed: