haproxy/CVE-2021-39241-pre.patch
programmer12 e5da9a995a fix CVES
(cherry picked from commit ec5d6d1219bed6e9096581fdd58d2c86ef32519d)
2021-08-28 14:25:03 +08:00

26 lines
744 B
Diff

From 038af20a857ab1f656d5f949c2c5e00d55005c73 Mon Sep 17 00:00:00 2001
From: Amaury Denoyelle <adenoyelle@haproxy.com>
Date: Fri, 11 Dec 2020 17:53:09 +0100
Subject: [PATCH 1/1] MEDIUM:h2: parse Extended CONNECT request to htx
---
src/h2.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/src/h2.c b/src/h2.c
index 656fed4..3f739e7 100644
--- a/src/h2.c
+++ b/src/h2.c
@@ -173,7 +173,7 @@ int h2_parse_cont_len_header(unsigned int *msgf, struct ist *value, unsigned lon
*/
static struct htx_sl *h2_prepare_htx_reqline(uint32_t fields, struct ist *phdr, struct htx *htx, unsigned int *msgf)
{
- struct ist uri;
+ struct ist uri,meth_sl;
unsigned int flags = HTX_SL_F_NONE;
struct htx_sl *sl;
size_t i;
--
2.23.0