Skip to content

Report correct body size in buffered mode.#254

Merged
istio-testing merged 1 commit intoistio:release-1.7from
PiotrSikora:fix_buffer_size-istio-1.7
Aug 7, 2020
Merged

Report correct body size in buffered mode.#254
istio-testing merged 1 commit intoistio:release-1.7from
PiotrSikora:fix_buffer_size-istio-1.7

Conversation

@PiotrSikora
Copy link

Signed-off-by: Piotr Sikora piotrsikora@google.com

Signed-off-by: Piotr Sikora <piotrsikora@google.com>
@istio-testing istio-testing merged commit 07e51c4 into istio:release-1.7 Aug 7, 2020
bianpengyuan pushed a commit to bianpengyuan/envoy that referenced this pull request Apr 15, 2021
Fixes CVE-2021-28682, a remotely exploitable integer overflow.

Signed-off-by: Asra Ali <asraa@google.com>
Co-authored-by: Tony Allen <tony@allen.gg>
Co-authored-by: Christoph Pakulski <christoph@tetrate.io>
Signed-off-by: Tony Allen <tony@allen.gg>
istio-testing pushed a commit that referenced this pull request Apr 15, 2021
* backport to 1.17: http: Fixing empty metadata map handling (#230) (#252)

Commit Message: Fixing a crash when the decoder receives an empty metadata map.

Additional Description:
Upon receiving an empty metadata map and trying to decode it an assertion is triggered in debug mode, and a seg-fault occurs in release mode.
The proposed fix ignores the empty metadata maps and updates a stats if one is received.

Risk Level: Medium for Envoy's running with Metadata support.
Testing: Added integration tests.
Docs Changes: Added a codec stats counter description.
Release Notes: Added bug fix description.
Platform Specific Features: N/A.
Fixes a fuzz bug: 25303

Signed-off-by: Tony Allen <tony@allen.gg>

* ssl: fix crash when peer sends an SSL Alert with an un… (#262)

Fix for CVE-2021-28683 (crash when peer sends an SSL Alert with an unknown code)

Signed-off-by: Greg Greenway <ggreenway@apple.com>
Co-authored-by: Christoph Pakulski <christoph@tetrate.io>
Signed-off-by: Tony Allen <tony@allen.gg>

* grpc: fix grpc-timeout integer overflow (#254)

Fixes CVE-2021-28682, a remotely exploitable integer overflow.

Signed-off-by: Asra Ali <asraa@google.com>
Co-authored-by: Tony Allen <tony@allen.gg>
Co-authored-by: Christoph Pakulski <christoph@tetrate.io>
Signed-off-by: Tony Allen <tony@allen.gg>

Co-authored-by: Tony Allen <tony@allen.gg>
Co-authored-by: Rei Shimizu <Shikugawa@gmail.com>
Co-authored-by: Christoph Pakulski <christoph@tetrate.io>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants