Skip to content

CVE-2025-48976: Introduce partHeaderTotalSizeMax for all parts of a single request #425

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 5 commits into
base: master
Choose a base branch
from

Conversation

Chenjp
Copy link

@Chenjp Chenjp commented Jul 2, 2025

Flexible limitation policy. Particularly, "partHeaderTotalSizeMax" provides a direct memory usage limits for all parts headers in request level.

partHeaderTotalSizeMax and partHeaderTotalCoutMax: apply to all header information for all parts in a single upload file request.

See BZ69710#c31

…SizeMax

Flexible limitation policy. Particularly, "partHeaderTotalSizeMax" provides a direct memory usage limits for all parts headers.

See BZ69710#c31
@markt-asf
Copy link
Contributor

partHeaderTotalSizeMax looks to be sufficient. No need to limit header count as well.

There are a lot of unrelated changes in this PR. They should be removed.

With the new limit in place the per part header size limit could be relaxed/removed. In 2.0 at least anyway.

Chenjp added 3 commits July 3, 2025 09:06
per Mark's comment, partHeaderTotalCountMax is sufficient enough.
@Chenjp
Copy link
Author

Chenjp commented Jul 3, 2025

partHeaderTotalSizeMax looks to be sufficient. No need to limit header count as well.

There are a lot of unrelated changes in this PR. They should be removed.

With the new limit in place the per part header size limit could be relaxed/removed. In 2.0 at least anyway.

@markt-asf Unrelated changes removed. Thanks.

@Chenjp Chenjp changed the title CVE-2025-48976: Introduce partHeaderTotalSizeMax and partHeaderTotalCoutMax CVE-2025-48976: Introduce partHeaderTotalSizeMax for all parts of a single request Jul 3, 2025
Copy link
Member

@garydgregory garydgregory left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hi @Chenjp
Thank you for your update. Please see my comments and add Javadoc since tags for new public and protected elements.

@Chenjp Chenjp requested a review from garydgregory July 4, 2025 00:27
@dmoebius
Copy link

dmoebius commented Jul 9, 2025

I'm confused. GHSA-vv7r-c36w-3prj says that the CVE is fixed in 2.0.0-M4, while this PR is still open. The OWASP scanner still reports 2.0.0-M4 as affected. Who's right?

@markt-asf
Copy link
Contributor

This is just an alternative approach.
The CVE announcement from the ASF contains the correct version information.
The OWASP scanner appears to be reporting a false positive.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants