CVE num upstream commit openEuler patch CVE-2023-29400 9db0e74f606b8afb28cc71d4b1c8b4ed24cabbf5 0016-release-branch.go1.19-html-template-emit-filterFails.patch CVE-2023-24540 ce7bd33345416e6d8cac901792060591cafc2797 0015-release-branch.go1.19-html-template-handle-all-JS-wh.patch CVE-2023-24539 e49282327b05192e46086bf25fd3ac691205fe80 0014-release-branch.go1.19-html-template-disallow-angle-b.patch CVE-2023-24538 b1e3ecfa06b67014429a197ec5e134ce4303ad9b 0013-release-branch.go1.19-html-template-disallow-actions.patch CVE-2023-24537 126a1d02da82f93ede7ce0bd8d3c51ef627f2104 0012-release-branch.go1.19-go-scanner-reject-large-line-a.patch CVE-2023-24536 7917b5f31204528ea72e0629f0b7d52b35b27538 0011-release-branch.go1.19-mime-multipart-limit-parsed-mi.patch CVE-2023-24536 7a359a651c7ebdb29e0a1c03102fce793e9f58f0 0010-release-branch.go1.19-net-textproto-mime-multipart-i.patch CVE-2023-24536 ef41a4e2face45e580c5836eaebd51629fc23f15 0009-release-branch.go1.19-mime-multipart-avoid-excessive.patch CVE-2023-24534 d6759e7a059f4208f07aa781402841d7ddaaef96 0008-release-branch.go1.19-net-textproto-avoid-overpredic.patch CVE-2023-24532 639b67ed114151c0d786aa26e7faeab942400703 0007-release-branch.go1.19-crypto-internal-nistec-reduce-.patch CVE-2022-41723 5c3e11bd0b5c0a86e5beffcd4339b86a902b21c3 0006-release-branch.go1.19-net-http-update-bundled-golang.patch CVE-2022-41724 00b256e9e3c0fa02a278ec9dfc3e191e02ceaf80 0005-release-branch.go1.19-crypto-tls-replace-all-usages-.patch CVE-2022-41725 5c55ac9bf1e5f779220294c843526536605f42ab 0004-release-branch.go1.19-mime-multipart-limit-memory-in.patch CVE-2022-41722 3345ddca41f00f9ed6fc3c1a36f6e2bede02d7ff 0003-release-branch.go1.19-path-filepath-do-not-Clean-a-..patch Signed-off-by: zhangzhihui <zhangzhihui@xfusion.com>
345 lines
12 KiB
Diff
345 lines
12 KiB
Diff
From 7917b5f31204528ea72e0629f0b7d52b35b27538 Mon Sep 17 00:00:00 2001
|
|
From: Damien Neil <dneil@google.com>
|
|
Date: Mon, 20 Mar 2023 10:43:19 -0700
|
|
Subject: [PATCH] [release-branch.go1.19] mime/multipart: limit parsed mime
|
|
message sizes
|
|
|
|
The parsed forms of MIME headers and multipart forms can consume
|
|
substantially more memory than the size of the input data.
|
|
A malicious input containing a very large number of headers or
|
|
form parts can cause excessively large memory allocations.
|
|
|
|
Set limits on the size of MIME data:
|
|
|
|
Reader.NextPart and Reader.NextRawPart limit the the number
|
|
of headers in a part to 10000.
|
|
|
|
Reader.ReadForm limits the total number of headers in all
|
|
FileHeaders to 10000.
|
|
|
|
Both of these limits may be set with with
|
|
GODEBUG=multipartmaxheaders=<values>.
|
|
|
|
Reader.ReadForm limits the number of parts in a form to 1000.
|
|
This limit may be set with GODEBUG=multipartmaxparts=<value>.
|
|
|
|
Thanks for Jakob Ackermann (@das7pad) for reporting this issue.
|
|
|
|
For CVE-2023-24536
|
|
For #59153
|
|
For #59269
|
|
|
|
Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/1802455
|
|
Run-TryBot: Damien Neil <dneil@google.com>
|
|
Reviewed-by: Roland Shoemaker <bracewell@google.com>
|
|
Reviewed-by: Julie Qiu <julieqiu@google.com>
|
|
Reviewed-on: https://team-review.git.corp.google.com/c/golang/go-private/+/1801087
|
|
Reviewed-by: Damien Neil <dneil@google.com>
|
|
Run-TryBot: Roland Shoemaker <bracewell@google.com>
|
|
Change-Id: If134890d75f0d95c681d67234daf191ba08e6424
|
|
Reviewed-on: https://go-review.googlesource.com/c/go/+/481985
|
|
Run-TryBot: Michael Knyszek <mknyszek@google.com>
|
|
Auto-Submit: Michael Knyszek <mknyszek@google.com>
|
|
TryBot-Result: Gopher Robot <gobot@golang.org>
|
|
Reviewed-by: Matthew Dempsky <mdempsky@google.com>
|
|
---
|
|
src/mime/multipart/formdata.go | 19 ++++++++-
|
|
src/mime/multipart/formdata_test.go | 61 ++++++++++++++++++++++++++++
|
|
src/mime/multipart/multipart.go | 31 ++++++++++----
|
|
src/mime/multipart/readmimeheader.go | 2 +-
|
|
src/net/textproto/reader.go | 19 +++++----
|
|
5 files changed, 115 insertions(+), 17 deletions(-)
|
|
|
|
diff --git a/src/mime/multipart/formdata.go b/src/mime/multipart/formdata.go
|
|
index 3f6ff697ca..4f26aab2cf 100644
|
|
--- a/src/mime/multipart/formdata.go
|
|
+++ b/src/mime/multipart/formdata.go
|
|
@@ -12,6 +12,7 @@ import (
|
|
"math"
|
|
"net/textproto"
|
|
"os"
|
|
+ "strconv"
|
|
)
|
|
|
|
// ErrMessageTooLarge is returned by ReadForm if the message form
|
|
@@ -41,6 +42,15 @@ func (r *Reader) readForm(maxMemory int64) (_ *Form, err error) {
|
|
numDiskFiles := 0
|
|
multipartFiles := godebug.Get("multipartfiles")
|
|
combineFiles := multipartFiles != "distinct"
|
|
+ maxParts := 1000
|
|
+ multipartMaxParts := godebug.Get("multipartmaxparts")
|
|
+ if multipartMaxParts != "" {
|
|
+ if v, err := strconv.Atoi(multipartMaxParts); err == nil && v >= 0 {
|
|
+ maxParts = v
|
|
+ }
|
|
+ }
|
|
+ maxHeaders := maxMIMEHeaders()
|
|
+
|
|
defer func() {
|
|
if file != nil {
|
|
if cerr := file.Close(); err == nil {
|
|
@@ -86,13 +96,17 @@ func (r *Reader) readForm(maxMemory int64) (_ *Form, err error) {
|
|
}
|
|
var copyBuf []byte
|
|
for {
|
|
- p, err := r.nextPart(false, maxMemoryBytes)
|
|
+ p, err := r.nextPart(false, maxMemoryBytes, maxHeaders)
|
|
if err == io.EOF {
|
|
break
|
|
}
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
+ if maxParts <= 0 {
|
|
+ return nil, ErrMessageTooLarge
|
|
+ }
|
|
+ maxParts--
|
|
|
|
name := p.FormName()
|
|
if name == "" {
|
|
@@ -136,6 +150,9 @@ func (r *Reader) readForm(maxMemory int64) (_ *Form, err error) {
|
|
if maxMemoryBytes < 0 {
|
|
return nil, ErrMessageTooLarge
|
|
}
|
|
+ for _, v := range p.Header {
|
|
+ maxHeaders -= int64(len(v))
|
|
+ }
|
|
fh := &FileHeader{
|
|
Filename: filename,
|
|
Header: p.Header,
|
|
diff --git a/src/mime/multipart/formdata_test.go b/src/mime/multipart/formdata_test.go
|
|
index 8ed26e0c34..c78eeb7a12 100644
|
|
--- a/src/mime/multipart/formdata_test.go
|
|
+++ b/src/mime/multipart/formdata_test.go
|
|
@@ -360,6 +360,67 @@ func testReadFormManyFiles(t *testing.T, distinct bool) {
|
|
}
|
|
}
|
|
|
|
+func TestReadFormLimits(t *testing.T) {
|
|
+ for _, test := range []struct {
|
|
+ values int
|
|
+ files int
|
|
+ extraKeysPerFile int
|
|
+ wantErr error
|
|
+ godebug string
|
|
+ }{
|
|
+ {values: 1000},
|
|
+ {values: 1001, wantErr: ErrMessageTooLarge},
|
|
+ {values: 500, files: 500},
|
|
+ {values: 501, files: 500, wantErr: ErrMessageTooLarge},
|
|
+ {files: 1000},
|
|
+ {files: 1001, wantErr: ErrMessageTooLarge},
|
|
+ {files: 1, extraKeysPerFile: 9998}, // plus Content-Disposition and Content-Type
|
|
+ {files: 1, extraKeysPerFile: 10000, wantErr: ErrMessageTooLarge},
|
|
+ {godebug: "multipartmaxparts=100", values: 100},
|
|
+ {godebug: "multipartmaxparts=100", values: 101, wantErr: ErrMessageTooLarge},
|
|
+ {godebug: "multipartmaxheaders=100", files: 2, extraKeysPerFile: 48},
|
|
+ {godebug: "multipartmaxheaders=100", files: 2, extraKeysPerFile: 50, wantErr: ErrMessageTooLarge},
|
|
+ } {
|
|
+ name := fmt.Sprintf("values=%v/files=%v/extraKeysPerFile=%v", test.values, test.files, test.extraKeysPerFile)
|
|
+ if test.godebug != "" {
|
|
+ name += fmt.Sprintf("/godebug=%v", test.godebug)
|
|
+ }
|
|
+ t.Run(name, func(t *testing.T) {
|
|
+ if test.godebug != "" {
|
|
+ t.Setenv("GODEBUG", test.godebug)
|
|
+ }
|
|
+ var buf bytes.Buffer
|
|
+ fw := NewWriter(&buf)
|
|
+ for i := 0; i < test.values; i++ {
|
|
+ w, _ := fw.CreateFormField(fmt.Sprintf("field%v", i))
|
|
+ fmt.Fprintf(w, "value %v", i)
|
|
+ }
|
|
+ for i := 0; i < test.files; i++ {
|
|
+ h := make(textproto.MIMEHeader)
|
|
+ h.Set("Content-Disposition",
|
|
+ fmt.Sprintf(`form-data; name="file%v"; filename="file%v"`, i, i))
|
|
+ h.Set("Content-Type", "application/octet-stream")
|
|
+ for j := 0; j < test.extraKeysPerFile; j++ {
|
|
+ h.Set(fmt.Sprintf("k%v", j), "v")
|
|
+ }
|
|
+ w, _ := fw.CreatePart(h)
|
|
+ fmt.Fprintf(w, "value %v", i)
|
|
+ }
|
|
+ if err := fw.Close(); err != nil {
|
|
+ t.Fatal(err)
|
|
+ }
|
|
+ fr := NewReader(bytes.NewReader(buf.Bytes()), fw.Boundary())
|
|
+ form, err := fr.ReadForm(1 << 10)
|
|
+ if err == nil {
|
|
+ defer form.RemoveAll()
|
|
+ }
|
|
+ if err != test.wantErr {
|
|
+ t.Errorf("ReadForm = %v, want %v", err, test.wantErr)
|
|
+ }
|
|
+ })
|
|
+ }
|
|
+}
|
|
+
|
|
func BenchmarkReadForm(b *testing.B) {
|
|
for _, test := range []struct {
|
|
name string
|
|
diff --git a/src/mime/multipart/multipart.go b/src/mime/multipart/multipart.go
|
|
index fc50d35196..fab676a70a 100644
|
|
--- a/src/mime/multipart/multipart.go
|
|
+++ b/src/mime/multipart/multipart.go
|
|
@@ -16,11 +16,13 @@ import (
|
|
"bufio"
|
|
"bytes"
|
|
"fmt"
|
|
+ "internal/godebug"
|
|
"io"
|
|
"mime"
|
|
"mime/quotedprintable"
|
|
"net/textproto"
|
|
"path/filepath"
|
|
+ "strconv"
|
|
"strings"
|
|
)
|
|
|
|
@@ -128,12 +130,12 @@ func (r *stickyErrorReader) Read(p []byte) (n int, _ error) {
|
|
return n, r.err
|
|
}
|
|
|
|
-func newPart(mr *Reader, rawPart bool, maxMIMEHeaderSize int64) (*Part, error) {
|
|
+func newPart(mr *Reader, rawPart bool, maxMIMEHeaderSize, maxMIMEHeaders int64) (*Part, error) {
|
|
bp := &Part{
|
|
Header: make(map[string][]string),
|
|
mr: mr,
|
|
}
|
|
- if err := bp.populateHeaders(maxMIMEHeaderSize); err != nil {
|
|
+ if err := bp.populateHeaders(maxMIMEHeaderSize, maxMIMEHeaders); err != nil {
|
|
return nil, err
|
|
}
|
|
bp.r = partReader{bp}
|
|
@@ -149,9 +151,9 @@ func newPart(mr *Reader, rawPart bool, maxMIMEHeaderSize int64) (*Part, error) {
|
|
return bp, nil
|
|
}
|
|
|
|
-func (p *Part) populateHeaders(maxMIMEHeaderSize int64) error {
|
|
+func (p *Part) populateHeaders(maxMIMEHeaderSize, maxMIMEHeaders int64) error {
|
|
r := textproto.NewReader(p.mr.bufReader)
|
|
- header, err := readMIMEHeader(r, maxMIMEHeaderSize)
|
|
+ header, err := readMIMEHeader(r, maxMIMEHeaderSize, maxMIMEHeaders)
|
|
if err == nil {
|
|
p.Header = header
|
|
}
|
|
@@ -330,6 +332,19 @@ type Reader struct {
|
|
// including header keys, values, and map overhead.
|
|
const maxMIMEHeaderSize = 10 << 20
|
|
|
|
+func maxMIMEHeaders() int64 {
|
|
+ // multipartMaxHeaders is the maximum number of header entries NextPart will return,
|
|
+ // as well as the maximum combined total of header entries Reader.ReadForm will return
|
|
+ // in FileHeaders.
|
|
+ multipartMaxHeaders := godebug.Get("multipartmaxheaders")
|
|
+ if multipartMaxHeaders != "" {
|
|
+ if v, err := strconv.ParseInt(multipartMaxHeaders, 10, 64); err == nil && v >= 0 {
|
|
+ return v
|
|
+ }
|
|
+ }
|
|
+ return 10000
|
|
+}
|
|
+
|
|
// NextPart returns the next part in the multipart or an error.
|
|
// When there are no more parts, the error io.EOF is returned.
|
|
//
|
|
@@ -337,7 +352,7 @@ const maxMIMEHeaderSize = 10 << 20
|
|
// has a value of "quoted-printable", that header is instead
|
|
// hidden and the body is transparently decoded during Read calls.
|
|
func (r *Reader) NextPart() (*Part, error) {
|
|
- return r.nextPart(false, maxMIMEHeaderSize)
|
|
+ return r.nextPart(false, maxMIMEHeaderSize, maxMIMEHeaders())
|
|
}
|
|
|
|
// NextRawPart returns the next part in the multipart or an error.
|
|
@@ -346,10 +361,10 @@ func (r *Reader) NextPart() (*Part, error) {
|
|
// Unlike NextPart, it does not have special handling for
|
|
// "Content-Transfer-Encoding: quoted-printable".
|
|
func (r *Reader) NextRawPart() (*Part, error) {
|
|
- return r.nextPart(true, maxMIMEHeaderSize)
|
|
+ return r.nextPart(true, maxMIMEHeaderSize, maxMIMEHeaders())
|
|
}
|
|
|
|
-func (r *Reader) nextPart(rawPart bool, maxMIMEHeaderSize int64) (*Part, error) {
|
|
+func (r *Reader) nextPart(rawPart bool, maxMIMEHeaderSize, maxMIMEHeaders int64) (*Part, error) {
|
|
if r.currentPart != nil {
|
|
r.currentPart.Close()
|
|
}
|
|
@@ -374,7 +389,7 @@ func (r *Reader) nextPart(rawPart bool, maxMIMEHeaderSize int64) (*Part, error)
|
|
|
|
if r.isBoundaryDelimiterLine(line) {
|
|
r.partsRead++
|
|
- bp, err := newPart(r, rawPart, maxMIMEHeaderSize)
|
|
+ bp, err := newPart(r, rawPart, maxMIMEHeaderSize, maxMIMEHeaders)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
diff --git a/src/mime/multipart/readmimeheader.go b/src/mime/multipart/readmimeheader.go
|
|
index 6836928c9e..25aa6e2092 100644
|
|
--- a/src/mime/multipart/readmimeheader.go
|
|
+++ b/src/mime/multipart/readmimeheader.go
|
|
@@ -11,4 +11,4 @@ import (
|
|
// readMIMEHeader is defined in package net/textproto.
|
|
//
|
|
//go:linkname readMIMEHeader net/textproto.readMIMEHeader
|
|
-func readMIMEHeader(r *textproto.Reader, lim int64) (textproto.MIMEHeader, error)
|
|
+func readMIMEHeader(r *textproto.Reader, maxMemory, maxHeaders int64) (textproto.MIMEHeader, error)
|
|
diff --git a/src/net/textproto/reader.go b/src/net/textproto/reader.go
|
|
index c1284fde25..1ad4416ee1 100644
|
|
--- a/src/net/textproto/reader.go
|
|
+++ b/src/net/textproto/reader.go
|
|
@@ -483,12 +483,12 @@ var colon = []byte(":")
|
|
// "Long-Key": {"Even Longer Value"},
|
|
// }
|
|
func (r *Reader) ReadMIMEHeader() (MIMEHeader, error) {
|
|
- return readMIMEHeader(r, math.MaxInt64)
|
|
+ return readMIMEHeader(r, math.MaxInt64, math.MaxInt64)
|
|
}
|
|
|
|
// readMIMEHeader is a version of ReadMIMEHeader which takes a limit on the header size.
|
|
// It is called by the mime/multipart package.
|
|
-func readMIMEHeader(r *Reader, lim int64) (MIMEHeader, error) {
|
|
+func readMIMEHeader(r *Reader, maxMemory, maxHeaders int64) (MIMEHeader, error) {
|
|
// Avoid lots of small slice allocations later by allocating one
|
|
// large one ahead of time which we'll cut up into smaller
|
|
// slices. If this isn't big enough later, we allocate small ones.
|
|
@@ -506,7 +506,7 @@ func readMIMEHeader(r *Reader, lim int64) (MIMEHeader, error) {
|
|
// Account for 400 bytes of overhead for the MIMEHeader, plus 200 bytes per entry.
|
|
// Benchmarking map creation as of go1.20, a one-entry MIMEHeader is 416 bytes and large
|
|
// MIMEHeaders average about 200 bytes per entry.
|
|
- lim -= 400
|
|
+ maxMemory -= 400
|
|
const mapEntryOverhead = 200
|
|
|
|
// The first line cannot start with a leading space.
|
|
@@ -538,16 +538,21 @@ func readMIMEHeader(r *Reader, lim int64) (MIMEHeader, error) {
|
|
continue
|
|
}
|
|
|
|
+ maxHeaders--
|
|
+ if maxHeaders < 0 {
|
|
+ return nil, errors.New("message too large")
|
|
+ }
|
|
+
|
|
// Skip initial spaces in value.
|
|
value := string(bytes.TrimLeft(v, " \t"))
|
|
|
|
vv := m[key]
|
|
if vv == nil {
|
|
- lim -= int64(len(key))
|
|
- lim -= mapEntryOverhead
|
|
+ maxMemory -= int64(len(key))
|
|
+ maxMemory -= mapEntryOverhead
|
|
}
|
|
- lim -= int64(len(value))
|
|
- if lim < 0 {
|
|
+ maxMemory -= int64(len(value))
|
|
+ if maxMemory < 0 {
|
|
// TODO: This should be a distinguishable error (ErrMessageTooLarge)
|
|
// to allow mime/multipart to detect it.
|
|
return m, errors.New("message too large")
|
|
--
|
|
2.37.1
|
|
|