mirror of
https://github.com/debauchee/barrier.git
synced 2026-05-15 14:16:02 -06:00
[PR #1347] [MERGED] Enforce max message length [SECURITY VULNERABILITY CVE-2021-42076] #1784
Labels
No labels
HiDPI
bounty
bsd/freebsd
bsd/openbsd
bug
bug
build-infra
cantfix
critical
doc
duplicate
enhancement
fix-available
from git
from release
good first issue
help wanted
installer/package
invalid
linux
macOS
meta
needs testing
pull-request
query
question
regression
regression
v2.4.0
windows
wontfix
work-in-progress
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/barrier#1784
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
📋 Pull Request Information
Original PR: https://github.com/debauchee/barrier/pull/1347
Author: @p12tic
Created: 11/1/2021
Status: ✅ Merged
Merged: 11/1/2021
Merged by: @p12tic
Base:
master← Head:enforce-max-message-length📝 Commits (5)
7ab8e01lib/server: Add a note about taking pointer to virtual member functioncc36982lib/server: Remove unused codee33c81blib: Enforce a maximum length of input messagesaf90f39lib/net: Limit the maximum size of TCP or SSL input buffersfd5295elib/barrier: Disconnect client on too long input packets📊 Changes
13 files changed (+106 additions, -31 deletions)
View changed files
➕
doc/newsfragments/enforce-maximum-message-length.bugfix(+6 -0)📝
src/lib/barrier/PacketStreamFilter.cpp(+16 -6)📝
src/lib/barrier/PacketStreamFilter.h(+3 -1)📝
src/lib/barrier/ProtocolUtil.cpp(+10 -0)📝
src/lib/barrier/protocol_types.h(+8 -0)📝
src/lib/base/EventTypes.cpp(+1 -0)📝
src/lib/base/EventTypes.h(+6 -0)📝
src/lib/client/ServerProxy.cpp(+20 -9)📝
src/lib/net/SecureSocket.cpp(+5 -0)📝
src/lib/net/TCPSocket.cpp(+5 -3)📝
src/lib/server/ClientListener.cpp(+0 -9)📝
src/lib/server/ClientProxy1_0.cpp(+20 -3)📝
src/lib/server/ClientProxyUnknown.cpp(+6 -0)📄 Description
This PR fixes a number of places where a malicious client serving large amount of data could have caused excessive memory allocations and denial of service by resource exhaustion.
This PR fixes the following security vulnerability:
The issue has been reported by Matthias Gerstner mgerstner@suse.de @mgerstner. Matthias also provided insights into how best to fix the issues, precise reproduction steps and any used tools and made the maintainer's life as pleasant as possible. Thank you!
🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.