This is an automated email from the ASF dual-hosted git repository.

eze pushed a commit to branch 8.1.x
in repository https://gitbox.apache.org/repos/asf/trafficserver.git


The following commit(s) were added to refs/heads/8.1.x by this push:
     new c50ee6c4f2 8.1.x: Fix a crash triggered by invalid range header 
(#10134)
c50ee6c4f2 is described below

commit c50ee6c4f2ae32f2c849fccb5b0f367165fe9c20
Author: Zhengxi Li <[email protected]>
AuthorDate: Tue Aug 1 17:25:42 2023 -0400

    8.1.x: Fix a crash triggered by invalid range header (#10134)
    
    Co-authored-by: Katsutoshi Ikenoya <[email protected]>
---
 proxy/http/HttpTransact.cc | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/proxy/http/HttpTransact.cc b/proxy/http/HttpTransact.cc
index c5a37a3b2e..c1d0cba06b 100644
--- a/proxy/http/HttpTransact.cc
+++ b/proxy/http/HttpTransact.cc
@@ -2820,7 +2820,7 @@ HttpTransact::build_response_from_cache(State *s, 
HTTPWarningCode warning_code)
           // this late.
           TxnDebug("http_seq", "[HttpTransact::HandleCacheOpenReadHit] 
Out-of-order Range request - tunneling");
           s->cache_info.action = CACHE_DO_NO_ACTION;
-          if (s->force_dns) {
+          if (s->force_dns || s->dns_info.lookup_success) {
             HandleCacheOpenReadMiss(s); // DNS is already completed no need of 
doing DNS
           } else {
             CallOSDNSLookup(s);

Reply via email to