-*- coding: utf-8 -*-
Changes with Apache 2.5.0
+ *) SECURITY: CVE-2014-3583 (cve.mitre.org)
+ mod_proxy_fcgi: Fix a potential crash with response headers' size above 8K.
+ [Teguh <chain rop.io>, Yann Ylavic]
+
*) event: Resolve potential crashes under load after r1604350. [Eric Covener]
*) mod_authnz_ldap: Resolve crashes with LDAP authz and non-LDAP authn since
#include "util_fcgi.h"
#include "util_script.h"
+#include "apr_lib.h" /* for apr_iscntrl() */
+
module AP_MODULE_DECLARE_DATA proxy_fcgi_module;
/*
*
* Returns 0 if it can't find the end of the headers, and 1 if it found the
* end of the headers. */
-static int handle_headers(request_rec *r,
- int *state,
- char *readbuf)
+static int handle_headers(request_rec *r, int *state,
+ const char *readbuf, apr_size_t readlen)
{
const char *itr = readbuf;
- while (*itr) {
+ while (readlen) {
if (*itr == '\r') {
switch (*state) {
case HDR_STATE_GOT_CRLF:
break;
}
}
- else {
+ else if (*itr == '\t' || !apr_iscntrl(*itr)) {
*state = HDR_STATE_READING_HEADERS;
}
+ else {
+ return -1;
+ }
if (*state == HDR_STATE_DONE_WITH_HEADERS)
break;
+ --readlen;
++itr;
}
APR_BRIGADE_INSERT_TAIL(ob, b);
if (! seen_end_of_headers) {
- int st = handle_headers(r, &header_state, iobuf);
+ int st = handle_headers(r, &header_state, iobuf,
+ readbuflen);
+
+ if (st == -1) {
+ *err = "parsing response headers";
+ rv = APR_EINVAL;
+ break;
+ }
if (st == 1) {
int status;
break;
}
+ if (*err) {
+ /* stop on error in the above switch */
+ break;
+ }
+
if (plen) {
rv = get_data_full(conn, iobuf, plen);
if (rv != APR_SUCCESS) {