![]() Tinyproxy commit 84f203f and earlier does not process HTTP request lines
in the process_request() function and is using uninitialized buffers.
This vulnerability allows attackers to access sensitive information at
system runtime.
Signed-off-by: Fabrice Fontaine <fontaine.fabrice@gmail.com>
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
(cherry picked from commit
|
||
---|---|---|
.. | ||
0001-prevent-junk-from-showing-up-in-error-page-in-invalid-requests.patch | ||
Config.in | ||
tinyproxy.hash | ||
tinyproxy.mk |