Bug 705414 - TTL overflow
Summary: TTL overflow
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise MRG
Classification: Red Hat
Component: qpid-cpp
Version: 1.3
Hardware: Unspecified
OS: Unspecified
medium
medium
Target Milestone: 3.0
: ---
Assignee: Gordon Sim
QA Contact: Leonid Zhaldybin
URL:
Whiteboard:
Depends On:
Blocks: 698367
TreeView+ depends on / blocked
 
Reported: 2011-05-17 15:47 UTC by Andy Goldstein
Modified: 2014-11-09 22:38 UTC (History)
5 users (show)

Fixed In Version: qpid-cpp-server-0.12
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2014-09-24 15:02:56 UTC
Target Upstream Version:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Apache JIRA QPID-3222 0 None None None Never
Red Hat Product Errata RHEA-2014:1296 0 normal SHIPPED_LIVE Red Hat Enterprise MRG Messaging 3.0 Release 2014-09-24 19:00:06 UTC

Description Andy Goldstein 2011-05-17 15:47:15 UTC
Description of problem: when setting a message's TTL to Duration::FOREVER, the calculated expiration time overflows, resulting in the message being expired essentially immediately.

See https://issues.apache.org/jira/browse/QPID-3222 for more details.

Comment 1 Gordon Sim 2011-05-17 15:50:45 UTC
Fixed upstream: http://svn.apache.org/viewvc?view=rev&rev=1096751

Comment 2 Leonid Zhaldybin 2013-07-30 13:22:18 UTC
Tested on RHEL6.4 (both i386 and x86_64).

Packages used for testing:

python-qpid-0.22-4.el6
python-qpid-qmf-0.22-7.el6
qpid-cpp-client-0.22-8.el6
qpid-cpp-client-devel-0.22-8.el6
qpid-cpp-client-devel-docs-0.22-8.el6
qpid-cpp-client-rdma-0.22-8.el6
qpid-cpp-client-ssl-0.22-8.el6
qpid-cpp-server-0.22-8.el6
qpid-cpp-server-devel-0.22-8.el6
qpid-cpp-server-ha-0.22-8.el6
qpid-cpp-server-rdma-0.22-8.el6
qpid-cpp-server-ssl-0.22-8.el6
qpid-cpp-server-store-0.22-8.el6
qpid-cpp-server-xml-0.22-8.el6
qpid-java-client-0.22-5.el6
qpid-java-common-0.22-5.el6
qpid-java-example-0.22-5.el6
qpid-proton-c-0.4-2.2.el6
qpid-qmf-0.22-7.el6
qpid-qmf-devel-0.22-7.el6
qpid-tools-0.22-3.el6

-> VERIFIED

Comment 4 errata-xmlrpc 2014-09-24 15:02:56 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

http://rhn.redhat.com/errata/RHEA-2014-1296.html


Note You need to log in before you can comment on or make changes to this bug.