CVE-2022-30635,CVE-2022-30630,CVE-2022-30632,CVE-2022-28131, CVE-2022-30631,CVE-2022-30629,CVE-2022-30634 Conflict: NA Score: CVE-2022-32148: 5.3 CVE-2022-1962: 6.2 CVE-2022-1705: 5.3 CVE-2022-30633: 6.2 CVE-2022-30635: 5.5 CVE-2022-30630: 6.2 CVE-2022-30632: 6.2 CVE-2022-28131: 6.2 CVE-2022-30631: 7.5 CVE-2022-30629: 2.6 CVE-2022-30634: 7.5 Reference: CVE-2022-32148: https://go-review.googlesource.com/c/go/+/415221 CVE-2022-1962: https://go-review.googlesource.com/c/go/+/417070 CVE-2022-1705: https://go-review.googlesource.com/c/go/+/415217 CVE-2022-30633: https://go-review.googlesource.com/c/go/+/417069 CVE-2022-30635: https://go-review.googlesource.com/c/go/+/417074 CVE-2022-30630: https://go-review.googlesource.com/c/go/+/417072 CVE-2022-30632: https://go-review.googlesource.com/c/go/+/417073 CVE-2022-28131: https://go-review.googlesource.com/c/go/+/417068 CVE-2022-30631: https://go-review.googlesource.com/c/go/+/417071 CVE-2022-30629: https://go-review.googlesource.com/c/go/+/408574 CVE-2022-30634: https://go-review.googlesource.com/c/go/+/406635 Reason: fix CVE: CVE-2022-32148: 0005-release-branch.go1.17-net-http-preserve-nil-values-i.patch CVE-2022-1962: 0006-release-branch.go1.17-go-parser-limit-recursion-dept.patch CVE-2022-1705: 0007-release-branch.go1.17-net-http-don-t-strip-whitespac.patch CVE-2022-30633: 0008-release-branch.go1.17-encoding-xml-limit-depth-of-ne.patch CVE-2022-30635: 0009-release-branch.go1.17-encoding-gob-add-a-depth-limit.patch CVE-2022-30630: 0010-release-branch.go1.17-io-fs-fix-stack-exhaustion-in-.patch CVE-2022-30632: 0011-release-branch.go1.17-path-filepath-fix-stack-exhaus.patch CVE-2022-28131: 0012-release-branch.go1.17-encoding-xml-use-iterative-Ski.patch CVE-2022-30631: 0013-release-branch.go1.17-compress-gzip-fix-stack-exhaus.patch CVE-2022-30629: 0014-release-branch.go1.17-crypto-tls-randomly-generate-t.patch CVE-2022-30634: 0015-release-branch.go1.17-crypto-rand-properly-handle-la.patch
169 lines
5.8 KiB
Diff
169 lines
5.8 KiB
Diff
From 106c859f68c3137cfa05c433a9b90494db386fda Mon Sep 17 00:00:00 2001
|
|
From: Roland Shoemaker <roland@golang.org>
|
|
Date: Tue, 29 Mar 2022 15:52:09 -0700
|
|
Subject: [PATCH 04/11] [release-branch.go1.17] encoding/xml: limit depth of
|
|
nesting in unmarshal
|
|
|
|
Prevent exhausting the stack limit when unmarshalling extremely deeply
|
|
nested structures into nested types.
|
|
|
|
Fixes #53715
|
|
Updates #53611
|
|
Fixes CVE-2022-30633
|
|
|
|
Change-Id: Ic6c5d41674c93cfc9a316135a408db9156d39c59
|
|
Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/1421319
|
|
Reviewed-by: Damien Neil <dneil@google.com>
|
|
Reviewed-by: Julie Qiu <julieqiu@google.com>
|
|
(cherry picked from commit ebee00a55e28931b2cad0e76207a73712b000432)
|
|
Reviewed-on: https://go-review.googlesource.com/c/go/+/417069
|
|
Reviewed-by: Heschi Kreinick <heschi@google.com>
|
|
Run-TryBot: Michael Knyszek <mknyszek@google.com>
|
|
TryBot-Result: Gopher Robot <gobot@golang.org>
|
|
|
|
Conflict: NA
|
|
Reference: https://go-review.googlesource.com/c/go/+/417069
|
|
---
|
|
src/encoding/xml/read.go | 27 +++++++++++++++++++--------
|
|
src/encoding/xml/read_test.go | 32 ++++++++++++++++++++++++++++++++
|
|
2 files changed, 51 insertions(+), 8 deletions(-)
|
|
|
|
diff --git a/src/encoding/xml/read.go b/src/encoding/xml/read.go
|
|
index ef5df3f7f6a..e0ed8b527ce 100644
|
|
--- a/src/encoding/xml/read.go
|
|
+++ b/src/encoding/xml/read.go
|
|
@@ -148,7 +148,7 @@ func (d *Decoder) DecodeElement(v interface{}, start *StartElement) error {
|
|
if val.Kind() != reflect.Ptr {
|
|
return errors.New("non-pointer passed to Unmarshal")
|
|
}
|
|
- return d.unmarshal(val.Elem(), start)
|
|
+ return d.unmarshal(val.Elem(), start, 0)
|
|
}
|
|
|
|
// An UnmarshalError represents an error in the unmarshaling process.
|
|
@@ -304,8 +304,15 @@ var (
|
|
textUnmarshalerType = reflect.TypeOf((*encoding.TextUnmarshaler)(nil)).Elem()
|
|
)
|
|
|
|
+const maxUnmarshalDepth = 10000
|
|
+
|
|
+var errExeceededMaxUnmarshalDepth = errors.New("exceeded max depth")
|
|
+
|
|
// Unmarshal a single XML element into val.
|
|
-func (d *Decoder) unmarshal(val reflect.Value, start *StartElement) error {
|
|
+func (d *Decoder) unmarshal(val reflect.Value, start *StartElement, depth int) error {
|
|
+ if depth >= maxUnmarshalDepth {
|
|
+ return errExeceededMaxUnmarshalDepth
|
|
+ }
|
|
// Find start element if we need it.
|
|
if start == nil {
|
|
for {
|
|
@@ -398,7 +405,7 @@ func (d *Decoder) unmarshal(val reflect.Value, start *StartElement) error {
|
|
v.Set(reflect.Append(val, reflect.Zero(v.Type().Elem())))
|
|
|
|
// Recur to read element into slice.
|
|
- if err := d.unmarshal(v.Index(n), start); err != nil {
|
|
+ if err := d.unmarshal(v.Index(n), start, depth+1); err != nil {
|
|
v.SetLen(n)
|
|
return err
|
|
}
|
|
@@ -521,13 +528,15 @@ Loop:
|
|
case StartElement:
|
|
consumed := false
|
|
if sv.IsValid() {
|
|
- consumed, err = d.unmarshalPath(tinfo, sv, nil, &t)
|
|
+ // unmarshalPath can call unmarshal, so we need to pass the depth through so that
|
|
+ // we can continue to enforce the maximum recusion limit.
|
|
+ consumed, err = d.unmarshalPath(tinfo, sv, nil, &t, depth)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if !consumed && saveAny.IsValid() {
|
|
consumed = true
|
|
- if err := d.unmarshal(saveAny, &t); err != nil {
|
|
+ if err := d.unmarshal(saveAny, &t, depth+1); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
@@ -672,7 +681,7 @@ func copyValue(dst reflect.Value, src []byte) (err error) {
|
|
// The consumed result tells whether XML elements have been consumed
|
|
// from the Decoder until start's matching end element, or if it's
|
|
// still untouched because start is uninteresting for sv's fields.
|
|
-func (d *Decoder) unmarshalPath(tinfo *typeInfo, sv reflect.Value, parents []string, start *StartElement) (consumed bool, err error) {
|
|
+func (d *Decoder) unmarshalPath(tinfo *typeInfo, sv reflect.Value, parents []string, start *StartElement, depth int) (consumed bool, err error) {
|
|
recurse := false
|
|
Loop:
|
|
for i := range tinfo.fields {
|
|
@@ -687,7 +696,7 @@ Loop:
|
|
}
|
|
if len(finfo.parents) == len(parents) && finfo.name == start.Name.Local {
|
|
// It's a perfect match, unmarshal the field.
|
|
- return true, d.unmarshal(finfo.value(sv, initNilPointers), start)
|
|
+ return true, d.unmarshal(finfo.value(sv, initNilPointers), start, depth+1)
|
|
}
|
|
if len(finfo.parents) > len(parents) && finfo.parents[len(parents)] == start.Name.Local {
|
|
// It's a prefix for the field. Break and recurse
|
|
@@ -716,7 +725,9 @@ Loop:
|
|
}
|
|
switch t := tok.(type) {
|
|
case StartElement:
|
|
- consumed2, err := d.unmarshalPath(tinfo, sv, parents, &t)
|
|
+ // the recursion depth of unmarshalPath is limited to the path length specified
|
|
+ // by the struct field tag, so we don't increment the depth here.
|
|
+ consumed2, err := d.unmarshalPath(tinfo, sv, parents, &t, depth)
|
|
if err != nil {
|
|
return true, err
|
|
}
|
|
diff --git a/src/encoding/xml/read_test.go b/src/encoding/xml/read_test.go
|
|
index 8c2e70fa22e..8c940aefb81 100644
|
|
--- a/src/encoding/xml/read_test.go
|
|
+++ b/src/encoding/xml/read_test.go
|
|
@@ -5,8 +5,11 @@
|
|
package xml
|
|
|
|
import (
|
|
+ "bytes"
|
|
+ "errors"
|
|
"io"
|
|
"reflect"
|
|
+ "runtime"
|
|
"strings"
|
|
"testing"
|
|
"time"
|
|
@@ -1079,3 +1082,32 @@ func TestUnmarshalWhitespaceAttrs(t *testing.T) {
|
|
t.Fatalf("whitespace attrs: Unmarshal:\nhave: %#+v\nwant: %#+v", v, want)
|
|
}
|
|
}
|
|
+
|
|
+func TestCVE202230633(t *testing.T) {
|
|
+ if runtime.GOARCH == "wasm" {
|
|
+ t.Skip("causes memory exhaustion on js/wasm")
|
|
+ }
|
|
+ defer func() {
|
|
+ p := recover()
|
|
+ if p != nil {
|
|
+ t.Fatal("Unmarshal panicked")
|
|
+ }
|
|
+ }()
|
|
+ var example struct {
|
|
+ Things []string
|
|
+ }
|
|
+ Unmarshal(bytes.Repeat([]byte("<a>"), 17_000_000), &example)
|
|
+}
|
|
+
|
|
+func TestCVE202228131(t *testing.T) {
|
|
+ type nested struct {
|
|
+ Parent *nested `xml:",any"`
|
|
+ }
|
|
+ var n nested
|
|
+ err := Unmarshal(bytes.Repeat([]byte("<a>"), maxUnmarshalDepth+1), &n)
|
|
+ if err == nil {
|
|
+ t.Fatal("Unmarshal did not fail")
|
|
+ } else if !errors.Is(err, errExeceededMaxUnmarshalDepth) {
|
|
+ t.Fatalf("Unmarshal unexpected error: got %q, want %q", err, errExeceededMaxUnmarshalDepth)
|
|
+ }
|
|
+}
|
|
--
|
|
2.30.2
|
|
|