Skip to content

sapi/cli: guard Content-Length overflow and enforce post_max_size#22017

Open
iliaal wants to merge 1 commit into
php:masterfrom
iliaal:fix/gh-22003-cli-server-content-length
Open

sapi/cli: guard Content-Length overflow and enforce post_max_size#22017
iliaal wants to merge 1 commit into
php:masterfrom
iliaal:fix/gh-22003-cli-server-content-length

Conversation

@iliaal
Copy link
Copy Markdown
Contributor

@iliaal iliaal commented May 12, 2026

The dev server crashes when Content-Length wraps ssize_t (30+ digit value), or when a legitimately large Content-Length passes pemalloc and aborts the process.

Guard the parser's Content-Length and chunked-size accumulators against SSIZE_MAX, then reject oversize Content-Length in on_headers_complete and reply 413 with the configured post_max_size in the body.

Fixes #22003

The dev server's HTTP parser accumulates Content-Length digits into an
ssize_t without an overflow check; a 30-digit value wraps and the
consumer aborts on pemalloc. Guard the decimal and chunked-size
accumulators against SSIZE_MAX, then reject in on_headers_complete when
the parsed length exceeds post_max_size and reply 413 with the
configured limit in the body.

Fixes phpGH-22003
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Remote DoS via overflowed Content-Length

1 participant