[Pkg-apache-commits] r1338 - in /trunk/apache2: changelog patches/00list patches/083_CVE-2011-3192.dpatch
sf at alioth.debian.org
sf at alioth.debian.org
Sun Aug 28 20:34:18 UTC 2011
Author: sf
Date: Sun Aug 28 20:34:17 2011
New Revision: 1338
URL: http://svn.debian.org/wsvn/pkg-apache/?sc=1&rev=1338
Log:
Fix for CVE-2011-3192 DoS by high mem usage for range requests
Added:
trunk/apache2/patches/083_CVE-2011-3192.dpatch (with props)
Modified:
trunk/apache2/changelog
trunk/apache2/patches/00list
Modified: trunk/apache2/changelog
URL: http://svn.debian.org/wsvn/pkg-apache/trunk/apache2/changelog?rev=1338&op=diff
==============================================================================
--- trunk/apache2/changelog (original)
+++ trunk/apache2/changelog Sun Aug 28 20:34:17 2011
@@ -1,5 +1,7 @@
-apache2 (2.2.19-2) UNRELEASED; urgency=low
-
+apache2 (2.2.19-2) UNRELEASED; urgency=high
+
+ * Fix CVE-2011-3192: DoS by high memory usage for a large number of
+ overlapping ranges.
* Reduce default KeepAliveTimeout from 15 to 5 seconds.
* Use "linux-any" in build-deps. Closes: #634709
* Improve description of the prefork MPM. Closes: #634242
Modified: trunk/apache2/patches/00list
URL: http://svn.debian.org/wsvn/pkg-apache/trunk/apache2/patches/00list?rev=1338&op=diff
==============================================================================
--- trunk/apache2/patches/00list (original)
+++ trunk/apache2/patches/00list Sun Aug 28 20:34:17 2011
@@ -23,6 +23,7 @@
077_CacheIgnoreURLSessionIdentifiers.dpatch
079_polish_translation.dpatch
082_ab_num_requests
+083_CVE-2011-3192.dpatch
099_config_guess_sub_update
200_cp_suexec.dpatch
201_build_suexec-custom.dpatch
Added: trunk/apache2/patches/083_CVE-2011-3192.dpatch
URL: http://svn.debian.org/wsvn/pkg-apache/trunk/apache2/patches/083_CVE-2011-3192.dpatch?rev=1338&op=file
==============================================================================
--- trunk/apache2/patches/083_CVE-2011-3192.dpatch (added)
+++ trunk/apache2/patches/083_CVE-2011-3192.dpatch Sun Aug 28 20:34:17 2011
@@ -1,0 +1,601 @@
+#! /bin/sh /usr/share/dpatch/dpatch-run
+## 083_CVE-2011-3192.dpatch by Stefan Fritsch <sf at debian.org>
+##
+## All lines beginning with `## DP:' are a description of the patch.
+## DP: Fix CVE-2011-3192 (memory usage with overlapping ranges):
+## DP: Backport related changes from upstream trunk up to r1162581,
+## DP: except for merging of ranges.
+
+ at DPATCH@
+diff -urNad '--exclude=CVS' '--exclude=.svn' '--exclude=.git' '--exclude=.arch' '--exclude=.hg' '--exclude=_darcs' '--exclude=.bzr' trunk~/modules/http/byterange_filter.c trunk/modules/http/byterange_filter.c
+--- trunk~/modules/http/byterange_filter.c 2010-02-26 10:32:15.000000000 +0100
++++ trunk/modules/http/byterange_filter.c 2011-08-28 22:27:27.452862404 +0200
+@@ -55,65 +55,8 @@
+ #include <unistd.h>
+ #endif
+
+-static int parse_byterange(char *range, apr_off_t clength,
+- apr_off_t *start, apr_off_t *end)
+-{
+- char *dash = strchr(range, '-');
+- char *errp;
+- apr_off_t number;
+-
+- if (!dash) {
+- return 0;
+- }
+-
+- if ((dash == range)) {
+- /* In the form "-5" */
+- if (apr_strtoff(&number, dash+1, &errp, 10) || *errp) {
+- return 0;
+- }
+- *start = clength - number;
+- *end = clength - 1;
+- }
+- else {
+- *dash++ = '\0';
+- if (apr_strtoff(&number, range, &errp, 10) || *errp) {
+- return 0;
+- }
+- *start = number;
+- if (*dash) {
+- if (apr_strtoff(&number, dash, &errp, 10) || *errp) {
+- return 0;
+- }
+- *end = number;
+- }
+- else { /* "5-" */
+- *end = clength - 1;
+- }
+- }
+-
+- if (*start < 0) {
+- *start = 0;
+- }
+-
+- if (*end >= clength) {
+- *end = clength - 1;
+- }
+-
+- if (*start > *end) {
+- return -1;
+- }
+-
+- return (*start > 0 || *end < clength);
+-}
+-
+-static int ap_set_byterange(request_rec *r);
+-
+-typedef struct byterange_ctx {
+- apr_bucket_brigade *bb;
+- int num_ranges;
+- char *boundary;
+- char *bound_head;
+-} byterange_ctx;
++static int ap_set_byterange(request_rec *r, apr_off_t clength,
++ apr_array_header_t **indexes);
+
+ /*
+ * Here we try to be compatible with clients that want multipart/x-byteranges
+@@ -131,28 +74,204 @@
+ }
+
+ #define BYTERANGE_FMT "%" APR_OFF_T_FMT "-%" APR_OFF_T_FMT "/%" APR_OFF_T_FMT
+-#define PARTITION_ERR_FMT "apr_brigade_partition() failed " \
+- "[%" APR_OFF_T_FMT ",%" APR_OFF_T_FMT "]"
++
++static apr_status_t copy_brigade_range(apr_bucket_brigade *bb,
++ apr_bucket_brigade *bbout,
++ apr_off_t start,
++ apr_off_t end)
++{
++ apr_bucket *first = NULL, *last = NULL, *out_first = NULL, *e;
++ apr_uint64_t pos = 0, off_first = 0, off_last = 0;
++ apr_status_t rv;
++ const char *s;
++ apr_size_t len;
++ apr_uint64_t start64, end64;
++ apr_off_t pofft = 0;
++
++ /*
++ * Once we know that start and end are >= 0 convert everything to apr_uint64_t.
++ * See the comments in apr_brigade_partition why.
++ * In short apr_off_t (for values >= 0)and apr_size_t fit into apr_uint64_t.
++ */
++ start64 = (apr_uint64_t)start;
++ end64 = (apr_uint64_t)end;
++
++ if (start < 0 || end < 0 || start64 > end64)
++ return APR_EINVAL;
++
++ for (e = APR_BRIGADE_FIRST(bb);
++ e != APR_BRIGADE_SENTINEL(bb);
++ e = APR_BUCKET_NEXT(e))
++ {
++ apr_uint64_t elen64;
++ /* we know that no bucket has undefined length (-1) */
++ AP_DEBUG_ASSERT(e->length != (apr_size_t)(-1));
++ elen64 = (apr_uint64_t)e->length;
++ if (!first && (elen64 + pos > start64)) {
++ first = e;
++ off_first = pos;
++ }
++ if (elen64 + pos > end64) {
++ last = e;
++ off_last = pos;
++ break;
++ }
++ pos += elen64;
++ }
++ if (!first || !last)
++ return APR_EINVAL;
++
++ e = first;
++ while (1)
++ {
++ apr_bucket *copy;
++ AP_DEBUG_ASSERT(e != APR_BRIGADE_SENTINEL(bb));
++ rv = apr_bucket_copy(e, ©);
++ if (rv != APR_SUCCESS) {
++ apr_brigade_cleanup(bbout);
++ return rv;
++ }
++
++ APR_BRIGADE_INSERT_TAIL(bbout, copy);
++ if (e == first) {
++ if (off_first != start64) {
++ rv = apr_bucket_split(copy, (apr_size_t)(start64 - off_first));
++ if (rv == APR_ENOTIMPL) {
++ rv = apr_bucket_read(copy, &s, &len, APR_BLOCK_READ);
++ if (rv != APR_SUCCESS) {
++ apr_brigade_cleanup(bbout);
++ return rv;
++ }
++ /*
++ * The read above might have morphed copy in a bucket
++ * of shorter length. So read and delete until we reached
++ * the correct bucket for splitting.
++ */
++ while (start64 - off_first > (apr_uint64_t)copy->length) {
++ apr_bucket *tmp;
++ int i = 0;
++ if (i++ >= 99999)
++ return APR_EINVAL;
++
++ tmp = APR_BUCKET_NEXT(copy);
++ off_first += (apr_uint64_t)copy->length;
++ APR_BUCKET_REMOVE(copy);
++ apr_bucket_destroy(copy);
++ copy = tmp;
++ rv = apr_bucket_read(copy, &s, &len, APR_BLOCK_READ);
++ if (rv != APR_SUCCESS) {
++ apr_brigade_cleanup(bbout);
++ return rv;
++ }
++ }
++ if (start64 > off_first) {
++ rv = apr_bucket_split(copy, (apr_size_t)(start64 - off_first));
++ if (rv != APR_SUCCESS) {
++ apr_brigade_cleanup(bbout);
++ return rv;
++ }
++ }
++ else {
++ copy = APR_BUCKET_PREV(copy);
++ }
++ }
++ else if (rv != APR_SUCCESS) {
++ apr_brigade_cleanup(bbout);
++ return rv;
++ }
++ out_first = APR_BUCKET_NEXT(copy);
++ APR_BUCKET_REMOVE(copy);
++ apr_bucket_destroy(copy);
++ }
++ else {
++ out_first = copy;
++ }
++ }
++ if (e == last) {
++ if (e == first) {
++ off_last += start64 - off_first;
++ copy = out_first;
++ }
++ if (end64 - off_last != (apr_uint64_t)e->length) {
++ rv = apr_bucket_split(copy, (apr_size_t)(end64 + 1 - off_last));
++ if (rv == APR_ENOTIMPL) {
++ rv = apr_bucket_read(copy, &s, &len, APR_BLOCK_READ);
++ if (rv != APR_SUCCESS) {
++ apr_brigade_cleanup(bbout);
++ return rv;
++ }
++ /*
++ * The read above might have morphed copy in a bucket
++ * of shorter length. So read until we reached
++ * the correct bucket for splitting.
++ */
++ while (end64 + 1 - off_last > (apr_uint64_t)copy->length) {
++ off_last += (apr_uint64_t)copy->length;
++ copy = APR_BUCKET_NEXT(copy);
++ rv = apr_bucket_read(copy, &s, &len, APR_BLOCK_READ);
++ if (rv != APR_SUCCESS) {
++ apr_brigade_cleanup(bbout);
++ return rv;
++ }
++ }
++ if (end64 < off_last + (apr_uint64_t)copy->length - 1) {
++ rv = apr_bucket_split(copy, end64 + 1 - off_last);
++ if (rv != APR_SUCCESS) {
++ apr_brigade_cleanup(bbout);
++ return rv;
++ }
++ }
++ }
++ else if (rv != APR_SUCCESS) {
++ apr_brigade_cleanup(bbout);
++ return rv;
++ }
++ copy = APR_BUCKET_NEXT(copy);
++ if (copy != APR_BRIGADE_SENTINEL(bbout)) {
++ APR_BUCKET_REMOVE(copy);
++ apr_bucket_destroy(copy);
++ }
++ }
++ break;
++ }
++ e = APR_BUCKET_NEXT(e);
++ }
++
++ AP_DEBUG_ASSERT(APR_SUCCESS == apr_brigade_length(bbout, 1, &pofft));
++ pos = (apr_uint64_t)pofft;
++ AP_DEBUG_ASSERT(pos == end64 - start64 + 1);
++ return APR_SUCCESS;
++}
++
++typedef struct indexes_t {
++ apr_off_t start;
++ apr_off_t end;
++} indexes_t;
+
+ AP_CORE_DECLARE_NONSTD(apr_status_t) ap_byterange_filter(ap_filter_t *f,
+ apr_bucket_brigade *bb)
+ {
+-#define MIN_LENGTH(len1, len2) ((len1 > len2) ? len2 : len1)
+ request_rec *r = f->r;
+ conn_rec *c = r->connection;
+- byterange_ctx *ctx;
+ apr_bucket *e;
+ apr_bucket_brigade *bsend;
++ apr_bucket_brigade *tmpbb;
+ apr_off_t range_start;
+ apr_off_t range_end;
+- char *current;
+ apr_off_t clength = 0;
+ apr_status_t rv;
+ int found = 0;
+ int num_ranges;
++ char *boundary = NULL;
++ char *bound_head = NULL;
++ apr_array_header_t *indexes;
++ indexes_t *idx;
++ int i;
+
+- /* Iterate through the brigade until reaching EOS or a bucket with
+- * unknown length. */
++ /*
++ * Iterate through the brigade until reaching EOS or a bucket with
++ * unknown length.
++ */
+ for (e = APR_BRIGADE_FIRST(bb);
+ (e != APR_BRIGADE_SENTINEL(bb) && !APR_BUCKET_IS_EOS(e)
+ && e->length != (apr_size_t)-1);
+@@ -160,16 +279,18 @@
+ clength += e->length;
+ }
+
+- /* Don't attempt to do byte range work if this brigade doesn't
++ /*
++ * Don't attempt to do byte range work if this brigade doesn't
+ * contain an EOS, or if any of the buckets has an unknown length;
+ * this avoids the cases where it is expensive to perform
+- * byteranging (i.e. may require arbitrary amounts of memory). */
++ * byteranging (i.e. may require arbitrary amounts of memory).
++ */
+ if (!APR_BUCKET_IS_EOS(e) || clength <= 0) {
+ ap_remove_output_filter(f);
+ return ap_pass_brigade(f->next, bb);
+ }
+
+- num_ranges = ap_set_byterange(r);
++ num_ranges = ap_set_byterange(r, clength, &indexes);
+
+ /* We have nothing to do, get out of the way. */
+ if (num_ranges == 0) {
+@@ -177,73 +298,59 @@
+ return ap_pass_brigade(f->next, bb);
+ }
+
+- ctx = apr_pcalloc(r->pool, sizeof(*ctx));
+- ctx->num_ranges = num_ranges;
+- /* create a brigade in case we never call ap_save_brigade() */
+- ctx->bb = apr_brigade_create(r->pool, c->bucket_alloc);
+-
+- if (ctx->num_ranges > 1) {
++ if (num_ranges > 1) {
+ /* Is ap_make_content_type required here? */
+ const char *orig_ct = ap_make_content_type(r, r->content_type);
+- ctx->boundary = apr_psprintf(r->pool, "%" APR_UINT64_T_HEX_FMT "%lx",
+- (apr_uint64_t)r->request_time, (long) getpid());
++ boundary = apr_psprintf(r->pool, "%" APR_UINT64_T_HEX_FMT "%lx",
++ (apr_uint64_t)r->request_time, (long) getpid());
+
+ ap_set_content_type(r, apr_pstrcat(r->pool, "multipart",
+ use_range_x(r) ? "/x-" : "/",
+ "byteranges; boundary=",
+- ctx->boundary, NULL));
++ boundary, NULL));
+
+ if (strcasecmp(orig_ct, NO_CONTENT_TYPE)) {
+- ctx->bound_head = apr_pstrcat(r->pool,
+- CRLF "--", ctx->boundary,
+- CRLF "Content-type: ",
+- orig_ct,
+- CRLF "Content-range: bytes ",
+- NULL);
++ bound_head = apr_pstrcat(r->pool,
++ CRLF "--", boundary,
++ CRLF "Content-type: ",
++ orig_ct,
++ CRLF "Content-range: bytes ",
++ NULL);
+ }
+ else {
+ /* if we have no type for the content, do our best */
+- ctx->bound_head = apr_pstrcat(r->pool,
+- CRLF "--", ctx->boundary,
+- CRLF "Content-range: bytes ",
+- NULL);
++ bound_head = apr_pstrcat(r->pool,
++ CRLF "--", boundary,
++ CRLF "Content-range: bytes ",
++ NULL);
+ }
+- ap_xlate_proto_to_ascii(ctx->bound_head, strlen(ctx->bound_head));
++ ap_xlate_proto_to_ascii(bound_head, strlen(bound_head));
+ }
+
+ /* this brigade holds what we will be sending */
+ bsend = apr_brigade_create(r->pool, c->bucket_alloc);
++ tmpbb = apr_brigade_create(r->pool, c->bucket_alloc);
+
+- while ((current = ap_getword(r->pool, &r->range, ','))
+- && (rv = parse_byterange(current, clength, &range_start,
+- &range_end))) {
+- apr_bucket *e2;
+- apr_bucket *ec;
+-
+- if (rv == -1) {
+- continue;
+- }
++ idx = (indexes_t *)indexes->elts;
++ for (i = 0; i < indexes->nelts; i++, idx++) {
++ range_start = idx->start;
++ range_end = idx->end;
+
+- /* These calls to apr_brigage_partition should only fail in
+- * pathological cases, e.g. a file being truncated whilst
+- * being served. */
+- if ((rv = apr_brigade_partition(bb, range_start, &ec)) != APR_SUCCESS) {
+- ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r,
+- PARTITION_ERR_FMT, range_start, clength);
+- continue;
+- }
+- if ((rv = apr_brigade_partition(bb, range_end+1, &e2)) != APR_SUCCESS) {
++ rv = copy_brigade_range(bb, tmpbb, range_start, range_end);
++ if (rv != APR_SUCCESS ) {
+ ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r,
+- PARTITION_ERR_FMT, range_end+1, clength);
++ "copy_brigade_range() failed [%" APR_OFF_T_FMT
++ "-%" APR_OFF_T_FMT ",%" APR_OFF_T_FMT "]",
++ range_start, range_end, clength);
+ continue;
+ }
+-
+ found = 1;
+
+- /* For single range requests, we must produce Content-Range header.
++ /*
++ * For single range requests, we must produce Content-Range header.
+ * Otherwise, we need to produce the multipart boundaries.
+ */
+- if (ctx->num_ranges == 1) {
++ if (num_ranges == 1) {
+ apr_table_setn(r->headers_out, "Content-Range",
+ apr_psprintf(r->pool, "bytes " BYTERANGE_FMT,
+ range_start, range_end, clength));
+@@ -251,7 +358,7 @@
+ else {
+ char *ts;
+
+- e = apr_bucket_pool_create(ctx->bound_head, strlen(ctx->bound_head),
++ e = apr_bucket_pool_create(bound_head, strlen(bound_head),
+ r->pool, c->bucket_alloc);
+ APR_BRIGADE_INSERT_TAIL(bsend, e);
+
+@@ -263,23 +370,13 @@
+ APR_BRIGADE_INSERT_TAIL(bsend, e);
+ }
+
+- do {
+- apr_bucket *foo;
+- const char *str;
+- apr_size_t len;
+-
+- if (apr_bucket_copy(ec, &foo) != APR_SUCCESS) {
+- /* As above; this should not fail since the bucket has
+- * a known length, but just to be sure, this takes
+- * care of uncopyable buckets that do somehow manage
+- * to slip through. */
+- /* XXX: check for failure? */
+- apr_bucket_read(ec, &str, &len, APR_BLOCK_READ);
+- apr_bucket_copy(ec, &foo);
+- }
+- APR_BRIGADE_INSERT_TAIL(bsend, foo);
+- ec = APR_BUCKET_NEXT(ec);
+- } while (ec != e2);
++ APR_BRIGADE_CONCAT(bsend, tmpbb);
++ if (i && i % 32 == 0) {
++ /* Every now and then, pass what we have down the filter chain */
++ if ((rv = ap_pass_brigade(f->next, bsend)) != APR_SUCCESS)
++ return rv;
++ apr_brigade_cleanup(bsend);
++ }
+ }
+
+ if (found == 0) {
+@@ -294,11 +391,11 @@
+ return ap_pass_brigade(f->next, bsend);
+ }
+
+- if (ctx->num_ranges > 1) {
++ if (num_ranges > 1) {
+ char *end;
+
+ /* add the final boundary */
+- end = apr_pstrcat(r->pool, CRLF "--", ctx->boundary, "--" CRLF, NULL);
++ end = apr_pstrcat(r->pool, CRLF "--", boundary, "--" CRLF, NULL);
+ ap_xlate_proto_to_ascii(end, strlen(end));
+ e = apr_bucket_pool_create(end, strlen(end), r->pool, c->bucket_alloc);
+ APR_BRIGADE_INSERT_TAIL(bsend, e);
+@@ -309,24 +406,32 @@
+
+ /* we're done with the original content - all of our data is in bsend. */
+ apr_brigade_cleanup(bb);
++ apr_brigade_destroy(tmpbb);
+
+ /* send our multipart output */
+ return ap_pass_brigade(f->next, bsend);
+ }
+
+-static int ap_set_byterange(request_rec *r)
++static int ap_set_byterange(request_rec *r, apr_off_t clength,
++ apr_array_header_t **indexes)
+ {
+ const char *range;
+ const char *if_range;
+ const char *match;
+ const char *ct;
+- int num_ranges;
++ char *cur;
++ int num_ranges = 0;
++ apr_off_t sum_lengths = 0;
++ indexes_t *idx;
++ int ranges = 1;
++ const char *it;
+
+ if (r->assbackwards) {
+ return 0;
+ }
+
+- /* Check for Range request-header (HTTP/1.1) or Request-Range for
++ /*
++ * Check for Range request-header (HTTP/1.1) or Request-Range for
+ * backwards-compatibility with second-draft Luotonen/Franks
+ * byte-ranges (e.g. Netscape Navigator 2-3).
+ *
+@@ -356,7 +461,8 @@
+ return 0;
+ }
+
+- /* Check the If-Range header for Etag or Date.
++ /*
++ * Check the If-Range header for Etag or Date.
+ * Note that this check will return false (as required) if either
+ * of the two etags are weak.
+ */
+@@ -373,17 +479,77 @@
+ }
+ }
+
+- if (!ap_strchr_c(range, ',')) {
+- /* a single range */
+- num_ranges = 1;
++ range += 6;
++ it = range;
++ while (*it) {
++ if (*it++ == ',') {
++ ranges++;
++ }
+ }
+- else {
+- /* a multiple range */
+- num_ranges = 2;
++ it = range;
++ *indexes = apr_array_make(r->pool, ranges, sizeof(indexes_t));
++ while ((cur = ap_getword(r->pool, &range, ','))) {
++ char *dash;
++ char *errp;
++ apr_off_t number, start, end;
++
++ if (!(dash = strchr(cur, '-'))) {
++ break;
++ }
++
++ if (dash == range) {
++ /* In the form "-5" */
++ if (apr_strtoff(&number, dash+1, &errp, 10) || *errp) {
++ break;
++ }
++ start = clength - number;
++ end = clength - 1;
++ }
++ else {
++ *dash++ = '\0';
++ if (apr_strtoff(&number, cur, &errp, 10) || *errp) {
++ break;
++ }
++ start = number;
++ if (*dash) {
++ if (apr_strtoff(&number, dash, &errp, 10) || *errp) {
++ break;
++ }
++ end = number;
++ }
++ else { /* "5-" */
++ end = clength - 1;
++ }
++ }
++
++ if (start < 0) {
++ start = 0;
++ }
++ if (end >= clength) {
++ end = clength - 1;
++ }
++
++ if (start > end) {
++ /* ignore? count? */
++ break;
++ }
++
++ idx = (indexes_t *)apr_array_push(*indexes);
++ idx->start = start;
++ idx->end = end;
++ sum_lengths += end - start + 1;
++ /* new set again */
++ num_ranges++;
++ }
++
++ if (sum_lengths >= clength) {
++ ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
++ "Sum of ranges not smaller than file, ignoring.");
++ return 0;
+ }
+
+ r->status = HTTP_PARTIAL_CONTENT;
+- r->range = range + 6;
++ r->range = it;
+
+ return num_ranges;
+ }
Propchange: trunk/apache2/patches/083_CVE-2011-3192.dpatch
------------------------------------------------------------------------------
svn:executable = *
More information about the Pkg-apache-commits
mailing list