Potential Vulnerability in Cloned Code#3086
Conversation
…parser/http_parser.c)
|
This code, as the names suggest, is part of a comparative benchmark only. As such, the code was cloned at the specific time the comparison was done, and represents an "archive copy" for reproducing the results. Of course, we might remove the archive copy and replace it with a revision link to the source repository, or at least clearly mark the files as old and having security issues. But in short, unless users willingly do not use Boost Beast, but instead use some benchmark code that is not part of Boost Beast, there is no security issue here. Interestingly, Beast might have corresponding issues with multiple Transfer-Encodings, but that's not the topic of this issue. |
|
Sorry for the late reply.
I think there are two specific issues the Node.js commit addressed: The presence of both beast/include/boost/beast/http/impl/basic_parser.ipp Lines 742 to 744 in a74967f beast/include/boost/beast/http/impl/basic_parser.ipp Lines 793 to 798 in a74967f Multiple beast/include/boost/beast/http/impl/basic_parser.ipp Lines 801 to 810 in a74967f When |
Summary
This PR fixes a potential security vulnerability in cloned code that appears to have missed an upstream security patch.
Details
test/bench/parser/nodejs-parser/http_parser.cWhat this PR does
References
Please review and merge this PR to ensure your repository is protected against this potential vulnerability.
Thank you for your time !