mirror of
https://git.haproxy.org/git/haproxy.git/
synced 2025-09-21 13:51:26 +02:00
BUG/MAJOR: mux-h2: Properly detect too large frames when decoding headers
In the function decoding payload of HEADERS frames, an internal error is returned if the frame length is too large. it cannot exceed the buffer size. The same is true when headers are splitted on several frames. The payload of HEADERS and CONTINUATION frames are merged and the overall size must not exceed the buffer size. However, there is a bug when the current frame is big enough to only have the space for a part of the header of the next frame. Because, in this case, we wait for more data, to have the whole frame header. We don't properly detect that the headers are too large to be stored in one buffer. In fact the test to trigger this error is not accurate. When the buffer is full, the error is reported if the frame length exceeds the amount of data in the buffer. But in reality, an error must be reported when we are unable to decode the current frame while the buffer is full. Because, in this case, we know there is no way to change this state. When the bug happens, the H2 connection is woken up in loop, consumming all the CPU. But the traffic is not blocked for all that. This patch must be backported as far as 2.0.
This commit is contained in:
parent
d6b4b6da3f
commit
07f88d7582
@ -4791,7 +4791,7 @@ next_frame:
|
||||
b_sub(&h2c->dbuf, hole);
|
||||
}
|
||||
|
||||
if (b_full(&h2c->dbuf) && h2c->dfl >= b_data(&h2c->dbuf)) {
|
||||
if (b_full(&h2c->dbuf) && h2c->dfl) {
|
||||
/* too large frames */
|
||||
h2c_error(h2c, H2_ERR_INTERNAL_ERROR);
|
||||
ret = -1;
|
||||
|
Loading…
x
Reference in New Issue
Block a user