CVE-2021-37149
authorAron Xu <aron@debian.org>
Sat, 21 May 2022 19:14:28 +0000 (20:14 +0100)
committerJean Baptiste Favre <debian@jbfavre.org>
Sat, 21 May 2022 19:14:28 +0000 (20:14 +0100)
commit8d49697f124784c63a2b4da110545750f9ce68c7
tree4dab747b2961731f3f62357cbc564c3facb71157
parenteb26b11d9620393e8986282b04037054871cb3b5
CVE-2021-37149

commit 2addc8ca71449ceac0d5b80172460ee09c938f5e
Author: Brian Neradt <brian.neradt@gmail.com>
Date:   Wed Oct 27 11:30:07 2021 -0500

    Detect and handle chunk header size truncation (#8458)

    This detects if a chunk header size is too large and, if so, closes the
    connection.

Gbp-Pq: Name 0020-CVE-2021-37149.patch
include/tscore/ink_memory.h
proxy/http/HttpTunnel.cc
src/tscore/Makefile.am
src/tscore/unit_tests/test_ink_memory.cc [new file with mode: 0644]