diff options
author | Aurelien DARRAGON <adarragon@haproxy.com> | 2023-05-11 10:34:49 +0200 |
---|---|---|
committer | Christopher Faulet <cfaulet@haproxy.com> | 2023-05-11 15:37:04 +0200 |
commit | 5313570605fdcf471e7286a68432830a2a1ca72f (patch) | |
tree | 139e6619f456ef52a24287d18468f9c2f8b9753f | |
parent | 7abc9224a69eb5f1b592336044257b38823a8fe3 (diff) | |
download | haproxy-5313570605fdcf471e7286a68432830a2a1ca72f.tar.gz |
BUG/MINOR: http_rules: fix errors paths in http_parse_redirect_rule()
http_parse_redirect_rule() doesn't perform enough checks around NULL
returning allocating functions.
Moreover, existing error paths don't perform cleanups. This could lead to
memory leaks.
Adding a few checks and a cleanup path to ensure memory errors are
properly handled and that no memory leaks occurs within the function
(already allocated structures are freed on error path).
It should partially fix GH #2130.
This patch depends on ("MINOR: proxy: add http_free_redirect_rule() function")
This could be backported up to 2.4. The patch is also relevant for
2.2 but "MINOR: proxy: add http_free_redirect_rule() function" would
need to be adapted first.
==
Backport notes:
-> For 2.2 only:
Replace:
(strcmp(args[cur_arg], "drop-query") == 0)
with:
(!strcmp(args[cur_arg],"drop-query"))
-> For 2.2 and 2.4:
Replace:
"expects 'code', 'prefix', 'location', 'scheme', 'set-cookie', 'clear-cookie', 'drop-query', 'ignore-empty' or 'append-slash' (was '%s')",
with:
"expects 'code', 'prefix', 'location', 'scheme', 'set-cookie', 'clear-cookie', 'drop-query' or 'append-slash' (was '%s')",
-rw-r--r-- | src/http_rules.c | 38 |
1 files changed, 27 insertions, 11 deletions
diff --git a/src/http_rules.c b/src/http_rules.c index 69ad455f4..1efba4a98 100644 --- a/src/http_rules.c +++ b/src/http_rules.c @@ -345,7 +345,7 @@ void http_free_redirect_rule(struct redirect_rule *rdr) struct redirect_rule *http_parse_redirect_rule(const char *file, int linenum, struct proxy *curproxy, const char **args, char **errmsg, int use_fmt, int dir) { - struct redirect_rule *rule; + struct redirect_rule *rule = NULL; int cur_arg; int type = REDIRECT_TYPE_NONE; int code = 302; @@ -406,7 +406,7 @@ struct redirect_rule *http_parse_redirect_rule(const char *file, int linenum, st memprintf(errmsg, "'%s': unsupported HTTP code '%s' (must be one of 301, 302, 303, 307 or 308)", args[cur_arg - 1], args[cur_arg]); - return NULL; + goto err; } } else if (strcmp(args[cur_arg], "drop-query") == 0) { @@ -423,7 +423,7 @@ struct redirect_rule *http_parse_redirect_rule(const char *file, int linenum, st cond = build_acl_cond(file, linenum, &curproxy->acl, curproxy, (const char **)args + cur_arg, errmsg); if (!cond) { memprintf(errmsg, "error in condition: %s", *errmsg); - return NULL; + goto err; } break; } @@ -431,32 +431,32 @@ struct redirect_rule *http_parse_redirect_rule(const char *file, int linenum, st memprintf(errmsg, "expects 'code', 'prefix', 'location', 'scheme', 'set-cookie', 'clear-cookie', 'drop-query', 'ignore-empty' or 'append-slash' (was '%s')", args[cur_arg]); - return NULL; + goto err; } cur_arg++; } if (type == REDIRECT_TYPE_NONE) { memprintf(errmsg, "redirection type expected ('prefix', 'location', or 'scheme')"); - return NULL; + goto err; } if (dir && type != REDIRECT_TYPE_LOCATION) { memprintf(errmsg, "response only supports redirect type 'location'"); - return NULL; + goto err; } rule = calloc(1, sizeof(*rule)); - if (!rule) { - memprintf(errmsg, "parsing [%s:%d]: out of memory.", file, linenum); - return NULL; - } + if (!rule) + goto out_of_memory; rule->cond = cond; LIST_INIT(&rule->rdr_fmt); if (!use_fmt) { /* old-style static redirect rule */ rule->rdr_str = strdup(destination); + if (!rule->rdr_str) + goto out_of_memory; rule->rdr_len = strlen(destination); } else { @@ -474,7 +474,7 @@ struct redirect_rule *http_parse_redirect_rule(const char *file, int linenum, st cap |= (dir ? SMP_VAL_BE_HRS_HDR : SMP_VAL_BE_HRQ_HDR); if (!(type == REDIRECT_TYPE_PREFIX && destination[0] == '/' && destination[1] == '\0')) { if (!parse_logformat_string(destination, curproxy, &rule->rdr_fmt, LOG_OPT_HTTP, cap, errmsg)) { - return NULL; + goto err; } free(curproxy->conf.lfs_file); curproxy->conf.lfs_file = strdup(curproxy->conf.args.file); @@ -489,11 +489,15 @@ struct redirect_rule *http_parse_redirect_rule(const char *file, int linenum, st rule->cookie_len = strlen(cookie); if (cookie_set) { rule->cookie_str = malloc(rule->cookie_len + 10); + if (!rule->cookie_str) + goto out_of_memory; memcpy(rule->cookie_str, cookie, rule->cookie_len); memcpy(rule->cookie_str + rule->cookie_len, "; path=/;", 10); rule->cookie_len += 9; } else { rule->cookie_str = malloc(rule->cookie_len + 21); + if (!rule->cookie_str) + goto out_of_memory; memcpy(rule->cookie_str, cookie, rule->cookie_len); memcpy(rule->cookie_str + rule->cookie_len, "; path=/; Max-Age=0;", 21); rule->cookie_len += 20; @@ -507,6 +511,18 @@ struct redirect_rule *http_parse_redirect_rule(const char *file, int linenum, st missing_arg: memprintf(errmsg, "missing argument for '%s'", args[cur_arg]); + goto err; + out_of_memory: + memprintf(errmsg, "parsing [%s:%d]: out of memory.", file, linenum); + err: + if (rule) + http_free_redirect_rule(rule); + else if (cond) { + /* rule not yet allocated, but cond already is */ + prune_acl_cond(cond); + free(cond); + } + return NULL; } |