BUG/MAJOR: http/htx: prevent unbounded loop in http_manage_server_side_cookies
authorAndrew McDermott <aim@frobware.com>
Fri, 11 Feb 2022 18:26:49 +0000 (18:26 +0000)
committerAdrian Bunk <bunk@debian.org>
Wed, 23 Apr 2025 17:55:00 +0000 (20:55 +0300)
commit453c61f49e389637957cc988533f2fc0f7d91c2a
tree26ef30dc16c5a5ff20b8c71625f641571a403c0c
parent74ca72b7055c490f69ad5e3871e2b545f1711847
BUG/MAJOR: http/htx: prevent unbounded loop in http_manage_server_side_cookies

Origin: https://git.haproxy.org/?p=haproxy-2.2.git;a=commit;h=eb1bdcb7cf6e7bd1690f7dcc6d97de3d79b54cdc
Bug-Debian-Security: https://security-tracker.debian.org/tracker/CVE-2022-0711

Ensure calls to http_find_header() terminate. If a "Set-Cookie2"
header is found then the while(1) loop in
http_manage_server_side_cookies() will never terminate, resulting in
the watchdog firing and the process terminating via SIGABRT.

The while(1) loop becomes unbounded because an unmatched call to
http_find_header("Set-Cookie") will leave ctx->blk=NULL. Subsequent
calls to check for "Set-Cookie2" will now enumerate from the beginning
of all the blocks and will once again match on subsequent
passes (assuming a match first time around), hence the loop becoming
unbounded.

This issue was introduced with HTX and this fix should be backported
to all versions supporting HTX.

Many thanks to Grant Spence (gspence@redhat.com) for working through
this issue with me.

(cherry picked from commit bfb15ab34ead85f64cd6da0e9fb418c9cd14cee8)
Signed-off-by: Willy Tarreau <w@1wt.eu>
(cherry picked from commit d8ce72f63e115fa0952e6a58e81c3d15dfc0a509)
Signed-off-by: Willy Tarreau <w@1wt.eu>
(cherry picked from commit 86032c309b1f42177826deaa39f7c26903a074ca)
Signed-off-by: Christopher Faulet <cfaulet@haproxy.com>
(cherry picked from commit 3cd203d61609fd427234fdb4f793193980860348)
Signed-off-by: Christopher Faulet <cfaulet@haproxy.com>
Gbp-Pq: Name 0001-BUG-MAJOR-http-htx-prevent-unbounded-loop-in-http_ma.patch
src/http_ana.c