Source: tinyproxy
Version: 1.11.3-1
Severity: important
Tags: security upstream
Forwarded: https://github.com/tinyproxy/tinyproxy/issues/602
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for tinyproxy.

CVE-2026-3945[0]:
| An integer overflow vulnerability in the HTTP chunked transfer
| encoding parser in tinyproxy up to and including version 1.11.3
| allows an unauthenticated remote attacker to cause a denial of
| service (DoS). The issue occurs because chunk size values are parsed
| using strtol() without properly validating overflow conditions
| (e.g., errno == ERANGE). A crafted chunk size such as
| 0x7fffffffffffffff (LONG_MAX) bypasses the existing validation check
| (chunklen < 0), leading to a signed integer overflow during
| arithmetic operations (chunklen + 2). This results in incorrect size
| calculations, causing the proxy to attempt reading an extremely
| large amount of request-body data and holding worker connections
| open indefinitely. An attacker can exploit this behavior to exhaust
| all available worker slots, preventing new connections from being
| accepted and causing complete service unavailability. Upstream
| addressed this issue in commit bb7edc4; however, the latest stable
| release (1.11.3) remains affected at the time of publication.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-3945
    https://www.cve.org/CVERecord?id=CVE-2026-3945
[1] https://github.com/tinyproxy/tinyproxy/issues/602
[2] https://github.com/tinyproxy/tinyproxy/pull/603

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to