You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@trafficcontrol.apache.org by GitBox <gi...@apache.org> on 2021/11/17 16:17:34 UTC

[GitHub] [trafficcontrol] ocket8888 opened a new pull request #6356: Fix possible overflow in DNSSEC key parsing

ocket8888 opened a new pull request #6356:
URL: https://github.com/apache/trafficcontrol/pull/6356


   This adds checks to the parsing of DNSSEC keys that certain numbers are of the expected widths instead of truncating potentially overflowing values to smaller bit sizes.
   
   <hr/>
   
   ## Which Traffic Control components are affected by this PR?
   - Traffic Ops
   
   ## What is the best way to verify this PR?
   Make sure the tests pass
   
   ## PR submission checklist
   - [x] This PR has tests
   - [ ] This PR has documentation
   - [ ] This PR has a CHANGELOG.md entry
   - [ ] This PR **DOES NOT FIX A SERIOUS SECURITY VULNERABILITY**


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: issues-unsubscribe@trafficcontrol.apache.org

For queries about this service, please contact Infrastructure at:
users@infra.apache.org



[GitHub] [trafficcontrol] rawlinp merged pull request #6356: Fix possible overflow in DNSSEC key parsing

Posted by GitBox <gi...@apache.org>.
rawlinp merged pull request #6356:
URL: https://github.com/apache/trafficcontrol/pull/6356


   


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: issues-unsubscribe@trafficcontrol.apache.org

For queries about this service, please contact Infrastructure at:
users@infra.apache.org