-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[release/7.0] Prevent use of null when processing ALPN list #81797
Conversation
Tagging subscribers to this area: @dotnet/area-system-security, @vcsjones Issue DetailsBackport of #81629 to release/7.0 /cc @wfurt Customer ImpactTestingRiskIMPORTANT: Is this backport for a servicing release? If so and this change touches code that ships in a NuGet package, please make certain that you have added any necessary package authoring and gotten it explicitly reviewed.
|
Tagging subscribers to this area: @dotnet/ncl, @vcsjones Issue DetailsBackport of #81629 to release/7.0 /cc @wfurt Customer ImpactTestingRiskIMPORTANT: Is this backport for a servicing release? If so and this change touches code that ships in a NuGet package, please make certain that you have added any necessary package authoring and gotten it explicitly reviewed.
|
512159f
to
b414e32
Compare
@carlossanlop we should NOT push this into March release, let's do it next month. Thank you! |
Marking as 'blocked' to first gather more info about impact, workaround feasibility and finding root-cause -- see comments in the template above. |
two customers verified the mainline fix. |
@carlossanlop it is ready for Tactics consideration -- the fix has been verified by 2 customers (see updated template). |
Approved by Tactics via email. |
Backport of #81629 to release/7.0
Fixes #81588
/cc @wfurt
Customer Impact
We can throw exception in our native callback we register in OpenSSL. OpenSSL cannot handle it, which leads to process crash.
It seems to be a rare condition - so far 2 customers hit it, (for one, happening once per 2 days). The impact is bad (a process crash).
The root cause is not yet fully understood. We need to look deeper into the dumps.
This is a band-aid fix ('null' check) to change crash into OpenSSL error code, which customer code can handle.
Testing
2 customers verified the fix on private 7.0 servicing bits in their environments - see confirmation and confirmation.
All functional tests are passing
Regression
Yes, this is a new code path in 7.0 which app written against 6.0 can hit.
Risk
Small