python: fix unbounded recursion DoS in FieldMask path handling#26509
Closed
CHIRANJEET1729DAS wants to merge 1 commit intoprotocolbuffers:mainfrom
Closed
python: fix unbounded recursion DoS in FieldMask path handling#26509CHIRANJEET1729DAS wants to merge 1 commit intoprotocolbuffers:mainfrom
CHIRANJEET1729DAS wants to merge 1 commit intoprotocolbuffers:mainfrom
Conversation
A FieldMask path string with thousands of dot-separated segments bypasses wire-level parser depth limits (they treat it as a flat string) and causes unbounded Python call-stack recursion in _FieldMaskTree, crashing the process with RecursionError. Two complementary defences: 1. AddPath() now rejects paths exceeding _MAX_FIELD_MASK_DEPTH (64) segments with a ValueError before they enter the tree. 2. _AddFieldPaths(), AddLeafNodes(), and _MergeMessage() are rewritten iteratively using explicit stacks, eliminating all unbounded Python call-stack growth as defence-in-depth. Security impact: any server using Union(), Intersect(), or CanonicalFormFromMask() on attacker-controlled FieldMask input was vulnerable to remote DoS via a ~2KB payload. Fixes: https://github.com/protocolbuffers/protobuf/issues/<ISSUE_NUMBER>
|
Thanks for your pull request! It looks like this may be your first contribution to a Google open source project. Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). View this failed invocation of the CLA check for more information. For the most up to date status, view the checks section at the bottom of the pull request. |
Contributor
|
I replied on #26489 for the shape of fix that I think we could accept, but we can't take a look at your PR without the CLA first. Thanks! |
Contributor
|
Thank you for raising this issue; resolved in 7adc4b6 so closing this PR Thanks! |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
A FieldMask path string with thousands of dot-separated segments bypasses wire-level parser depth limits (they treat it as a flat string) and causes unbounded Python call-stack recursion in _FieldMaskTree, crashing the process with RecursionError.
Two complementary defences:
AddPath() now rejects paths exceeding _MAX_FIELD_MASK_DEPTH (64) segments with a ValueError before they enter the tree.
_AddFieldPaths(), AddLeafNodes(), and _MergeMessage() are rewritten iteratively using explicit stacks, eliminating all unbounded Python call-stack growth as defence-in-depth.
Security impact: any server using Union(), Intersect(), or CanonicalFormFromMask() on attacker-controlled FieldMask input was vulnerable to remote DoS via a ~2KB payload.
Fixes: #26489