Improper Input Validation vulnerability in request line parsing
authorAron Xu <aron@debian.org>
Sat, 29 Oct 2022 12:33:47 +0000 (13:33 +0100)
committerAbhijith PA <abhijith@debian.org>
Sat, 29 Oct 2022 12:33:47 +0000 (13:33 +0100)
commite6dca7254f6575d1f29cd3a1aaee60ed96bbba74
tree568adf34daada983c1da9105f4faff220e57d96c
parentf986ebb9b1e635f6d3900cf2240da142af057c76
Improper Input Validation vulnerability in request line parsing

Origin: upstream
Applied-Upstream: 85c319a7f7c0537bee408ea25df6f1a5ed0a4071c4e6661a5a205b1f60279f0e66aa4960231859678c6f2ed84ba0d8e6255baceb99ee891ebe1ce473
Reviewed-by: Jean Baptiste Favre <debian@jbfavre.org>
Last-Update: 2022-05-21

Last-Update: 2022-05-21
Gbp-Pq: Name 0021-CVE_2021_44040.patch
16 files changed:
doc/admin-guide/files/records.config.en.rst
mgmt/RecordsConfig.cc
proxy/hdrs/HTTP.cc
proxy/hdrs/HTTP.h
proxy/hdrs/HdrTSOnly.cc
proxy/hdrs/URL.cc
proxy/hdrs/URL.h
proxy/http/HttpConfig.cc
proxy/http/HttpConfig.h
tests/gold_tests/headers/gold/bad_good_request.gold [new file with mode: 0644]
tests/gold_tests/headers/gold/bad_good_request_header.gold [new file with mode: 0644]
tests/gold_tests/headers/gold/bad_good_request_http1.gold [new file with mode: 0644]
tests/gold_tests/headers/gold/bad_method.gold [new file with mode: 0644]
tests/gold_tests/headers/gold/bad_protocol_number.gold [new file with mode: 0644]
tests/gold_tests/headers/gold/bad_te_value.gold [new file with mode: 0644]
tests/gold_tests/headers/good_request_after_bad.test.py [new file with mode: 0644]