CVE-2021-37149
authorAron Xu <aron@debian.org>
Sat, 29 Oct 2022 12:33:47 +0000 (13:33 +0100)
committerAbhijith PA <abhijith@debian.org>
Sat, 29 Oct 2022 12:33:47 +0000 (13:33 +0100)
commit66efbb741dea4bd51fd7f8da2bc422d485cc5d6c
tree24bfc067b125255bb76c72d90f087ba062498684
parent4709621315e29c0c6f9695156c2df9a38571898d
CVE-2021-37149

commit 2addc8ca71449ceac0d5b80172460ee09c938f5e
Author: Brian Neradt <brian.neradt@gmail.com>
Date:   Wed Oct 27 11:30:07 2021 -0500

    Detect and handle chunk header size truncation (#8458)

    This detects if a chunk header size is too large and, if so, closes the
    connection.

Gbp-Pq: Name 0020-CVE-2021-37149.patch
include/tscore/ink_memory.h
proxy/http/HttpTunnel.cc
src/tscore/Makefile.am
src/tscore/unit_tests/test_ink_memory.cc [new file with mode: 0644]