mirror of
https://git.haproxy.org/git/haproxy.git/
synced 2025-09-20 21:31:28 +02:00
BUG/MEDIUM: server: Duplicate healthcheck's alpn inherited from default server
When "check-alpn" parameter is inherited from the default server, the value is not duplicated, the pointer of the default server is used. However, when this parameter is overridden, the old value is released. So the "check-alpn" value of the default server is released. So it is possible to have a UAF if if another server inherit from the same the default server. To fix the issue, the "check-alpn" parameter must be handled the same way the "alpn" is. The default value is duplicated. So it could be safely released if it is forced on the server line. This patch should fix the issue #3096. It must be backported to all stable versions.
This commit is contained in:
parent
6ea50ba462
commit
f7a04b428a
@ -1574,7 +1574,7 @@ void free_check(struct check *check)
|
||||
}
|
||||
|
||||
ha_free(&check->pool_conn_name);
|
||||
|
||||
ha_free(&check->alpn_str);
|
||||
task_destroy(check->task);
|
||||
|
||||
check_release_buf(check, &check->bi);
|
||||
|
11
src/server.c
11
src/server.c
@ -2901,8 +2901,15 @@ void srv_settings_cpy(struct server *srv, const struct server *src, int srv_tmpl
|
||||
srv->check.use_ssl = src->check.use_ssl;
|
||||
srv->check.port = src->check.port;
|
||||
srv->check.sni = src->check.sni;
|
||||
srv->check.alpn_str = src->check.alpn_str;
|
||||
srv->check.alpn_len = src->check.alpn_len;
|
||||
if (src->check.alpn_str) {
|
||||
srv->check.alpn_str = malloc(src->check.alpn_len);
|
||||
if (srv->check.alpn_str) {
|
||||
memcpy(srv->check.alpn_str, src->check.alpn_str,
|
||||
src->check.alpn_len);
|
||||
srv->check.alpn_len = src->check.alpn_len;
|
||||
}
|
||||
}
|
||||
|
||||
if (!(srv->flags & SRV_F_RHTTP))
|
||||
srv->check.reuse_pool = src->check.reuse_pool;
|
||||
if (src->check.pool_conn_name)
|
||||
|
Loading…
x
Reference in New Issue
Block a user