Skip to content

Fix GH-16290: session cookie_lifetime ini value overflow. #16295

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
wants to merge 1 commit into from

Conversation

devnexen
Copy link
Member

@devnexen devnexen commented Oct 8, 2024

No description provided.

@devnexen
Copy link
Member Author

devnexen commented Oct 8, 2024

cc @Girgias what do you think should be a reasonable max value for cookie_lifetime ?

@Girgias
Copy link
Member

Girgias commented Oct 8, 2024

I think that boundary is sensible. Having cookies set for over a year seems bad practice anyway.

@cmb69 cmb69 linked an issue Oct 8, 2024 that may be closed by this pull request
@devnexen devnexen force-pushed the gh16290 branch 2 times, most recently from 13104f1 to 0a0e489 Compare October 8, 2024 12:09
@devnexen devnexen marked this pull request as ready for review October 8, 2024 17:10
@devnexen devnexen requested a review from Girgias as a code owner October 8, 2024 17:10
@nielsdos
Copy link
Member

While it may be bad practice, making them fail to set the lifetime is a BC break, as setting it to e.g. 1Y+1D would break real code now. I think we should just prevent the overflow and be done with it.

@Girgias
Copy link
Member

Girgias commented Oct 12, 2024

While it may be bad practice, making them fail to set the lifetime is a BC break, as setting it to e.g. 1Y+1D would break real code now. I think we should just prevent the overflow and be done with it.

Yes I was not saying that we should make it fail, just pointing out that it seems unlikely to cause any issues as I wouldn't expect a timeout to be set that high.

@devnexen devnexen force-pushed the gh16290 branch 4 times, most recently from 0b76b81 to 6699ede Compare October 12, 2024 23:51
@devnexen devnexen marked this pull request as draft October 13, 2024 00:03
@devnexen devnexen marked this pull request as ready for review October 13, 2024 06:07
Copy link
Member

@Girgias Girgias left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thank you!

@devnexen devnexen closed this in 84a8fea Oct 13, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

integer overflow in session.c:1353
3 participants