Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[UNDERTOW-2405][UNDERTOW-2391][UNDERTOW-2407][UNDERTOW-2408][UNDERTOW-2334] CVE-2024-27316 CVE-2023-5685 CVE-2024-6162 Backport bug fixes to 2.2.x #1612

Merged
merged 8 commits into from
Jun 22, 2024

Conversation

…er of connections and the length of header frames in the server.

The number of connections is now limited by the system property io.undertow.max-connections-per-listener, whose default value is 100. Also, the length of the header was already being partially controlled by MAX_HEADER_SIZE. Now that value has the default max header size enforced by Http2Channel.

Signed-off-by: Flavia Rainone <frainone@redhat.com>
…r config, we can use high and low watermarks for this

This reverts commit c27c1e4.

Signed-off-by: Flavia Rainone <frainone@redhat.com>
@fl4via fl4via added waiting CI check Ready to be merged but waiting for CI check backport The PR is the result of backporting another PR to a maintainance branch failed CI Introduced new regession(s) during CI check and removed waiting CI check Ready to be merged but waiting for CI check labels Jun 21, 2024
@fl4via fl4via force-pushed the 2.2.x_backport-bug-fixes branch 5 times, most recently from d265aa6 to 1a95cd1 Compare June 22, 2024 10:26
fl4via and others added 6 commits June 22, 2024 07:49
…p2-max-header-size, for configuring the maximum size of HTTP2 header sizes, default value set to 20000

Add a test for that new configuration and update affected tests accordingly.
Also: add TODO place holders for new config Undertow.HTTP2_MAX_HEADER_SIZE to be added in Undertow 2.4.0.Final.

Signed-off-by: Flavia Rainone <frainone@redhat.com>
…uses more data is PROTOCOL_ERROR

This makes this code consistent with the handling of headers that surpass the max header size limit elsewhere in HTTP2 (see Http2HeaderBlockParser.emitHeader), and the justification is that the max header size must have been handshaken with the peer as part of settings frame, via the SETTINGS_HEADER_TABLE_SIZE parameter.

Signed-off-by: Flavia Rainone <frainone@redhat.com>
Signed-off-by: Flavia Rainone <frainone@redhat.com>
Signed-off-by: Flavia Rainone <frainone@redhat.com>
Signed-off-by: Flavia Rainone <frainone@redhat.com>
…er StringBuilder instance between requests

Signed-off-by: Flavia Rainone <frainone@redhat.com>
@fl4via fl4via added waiting CI check Ready to be merged but waiting for CI check and removed failed CI Introduced new regession(s) during CI check waiting CI check Ready to be merged but waiting for CI check labels Jun 22, 2024
@fl4via fl4via merged commit ed4266f into undertow-io:2.2.x Jun 22, 2024
31 checks passed
@fl4via fl4via deleted the 2.2.x_backport-bug-fixes branch June 22, 2024 12:46
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
backport The PR is the result of backporting another PR to a maintainance branch
Projects
None yet
3 participants