source: squid-ssl/trunk/fuentes/debian/patches/CVE-2016-10003.patch @ 5503

Last change on this file since 5503 was 5503, checked in by Juanma, 4 years ago

Initial release

File size: 899 bytes
  • src/client_side_reply.cc

    Description: fix incorrect HTTP Request header comparison
    Origin: backport, http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2016_10_a.patch
    Bug-Debian: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=848491
    
    a b  
    474474        return;
    475475    }
    476476
     477    // The previously identified hit suddenly became unsharable!
     478    // This is common for collapsed forwarding slaves but might also
     479    // happen to regular hits because we are called asynchronously.
     480    if (EBIT_TEST(e->flags, KEY_PRIVATE)) {
     481        debugs(88, 3, "unsharable " << *e << ". MISS");
     482        http->logType = LOG_TCP_MISS;
     483        processMiss();
     484        return;
     485    }
     486
    477487    if (result.length == 0) {
    478488        debugs(88, 5, "store IO buffer has no content. MISS");
    479489        /* the store couldn't get enough data from the file for us to id the
Note: See TracBrowser for help on using the repository browser.