Re: svn commit: r1864868 - /httpd/httpd/trunk/server/core_filters.c

2019-08-10 Thread Marion & Christophe JAILLET

Hi all,

I would appreciate some other eyes on the patch below.
I guess that that the fix is correct, but I don't know the possible 
implication of the fix.


As said in the commit description, -1 seems to be a valid length, but I 
don't know if such buckets can happen here.


So this patch can change the behavior of the code and trigger a path 
that was never executed before.

Comments from s.o. with deeper understanding of filters are welcomed.


Should the commit description be tweaked, please do so.

CJ


Le 10/08/2019 à 11:52, jaillet...@apache.org a écrit :

Author: jailletc36
Date: Sat Aug 10 09:52:34 2019
New Revision: 1864868

URL: http://svn.apache.org/viewvc?rev=1864868=rev
Log:
Fix a signed/unsigned comparison that can never match.

-1 is a valid length value (for socket, pipe and cgi buckets for example)
All path I've checked cast the -1 to (apr_size_t) in order for the comparison 
to work. So do it as well here.

This has been like that in trunk since r708144, about 11 years ago, so I assume 
that it is not really an issue.

Spotted by gcc 9.1 and -Wextra

Modified:
 httpd/httpd/trunk/server/core_filters.c

Modified: httpd/httpd/trunk/server/core_filters.c
URL: 
http://svn.apache.org/viewvc/httpd/httpd/trunk/server/core_filters.c?rev=1864868=1864867=1864868=diff
==
--- httpd/httpd/trunk/server/core_filters.c (original)
+++ httpd/httpd/trunk/server/core_filters.c Sat Aug 10 09:52:34 2019
@@ -277,7 +277,7 @@ apr_status_t ap_core_input_filter(ap_fil
  while ((len < readbytes) && (rv == APR_SUCCESS)
 && (e != APR_BRIGADE_SENTINEL(ctx->bb))) {
  /* Check for the availability of buckets with known length */
-if (e->length != -1) {
+if (e->length != (apr_size_t)-1) {
  len += e->length;
  e = APR_BUCKET_NEXT(e);
  }





Re: [VOTE] Release httpd-2.4.41

2019-08-10 Thread Daniel Gruno

+1 From me as well.
A few snags with lua, but that's very platform specific and doesn't 
affect the vote. I should probably look into better compat with 5.3 later :)



On 8/9/19 11:25 PM, Daniel Ruggeri wrote:



On 2019/08/09 13:40:38, Daniel Ruggeri  wrote:

Hi, all;
 Please find below the proposed release tarball and signatures:
https://dist.apache.org/repos/dist/dev/httpd/

I would like to call a VOTE over the next few days to release this candidate 
tarball as 2.4.41:
[ ] +1: It's not just good, it's good enough!
[ ] +0: Let's have a talk.
[ ] -1: There's trouble in paradise. Here's what's wrong.

The computed digests of the tarball up for vote are:
sha1: b713e835aa7cde823a4b7f8e3463164f3d9fe63e *httpd-2.4.41.tar.gz
sha256: 3c0f9663240beb0f008acf3b4501c4f339d7467ee345a36c86c46b4d6f3a5461  
*httpd-2.4.41.tar.gz
--
Daniel Ruggeri


+1 from me.

Tested under the following conditions...

system:
   kernel:
 name: Linux
 release: 4.9.0-8-amd64
 version: #1 SMP Debian 4.9.144-3 (2019-02-02)
 machine: x86_64

   libraries:
 openssl: "1.1.1c"
 openldap: "2.4.48"
 apr: "1.7.0"
 apr-util: "1.6.1"
 iconv: "1.2.2"
 brotli: "1.0.7"
 nghttp2: "1.39.1"
 zlib: "1.2.11"
 pcre: "8.43"
 libxml2: "2.9.9"
 php: "7.3.8"
 lua: "5.3.5"
 curl: "7.65.3"