Skip to content

Conversation

@miss-islington
Copy link
Contributor

@miss-islingtonmiss-islington commented Dec 1, 2025

The CGI server on Windows could consume the amount of memory specified
in the Content-Length header of the request even if the client does not
send such much data. Now it reads the POST request body by chunks,
so that the memory consumption is proportional to the amount of sent
data.
(cherry picked from commit 29c657a)

Co-authored-by: Serhiy Storchaka [email protected]

…ial of service in http.server (pythonGH-119455) The CGI server on Windows could consume the amount of memory specified in the Content-Length header of the request even if the client does not send such much data. Now it reads the POST request body by chunks, so that the memory consumption is proportional to the amount of sent data. (cherry picked from commit 29c657a) Co-authored-by: Serhiy Storchaka <[email protected]>
@serhiy-storchakaserhiy-storchaka enabled auto-merge (squash) December 1, 2025 14:09
@serhiy-storchakaserhiy-storchaka merged commit 6c922bb into python:3.13Dec 1, 2025
75 of 77 checks passed
@bedevere-app
Copy link

GH-142185 is a backport of this pull request to the 3.13 branch.

hugovk added a commit to hugovk/cpython that referenced this pull request Dec 2, 2025
Yhg1s pushed a commit that referenced this pull request Dec 2, 2025
…enial of service in http.server (GH-119455) (GH-142130)" (#142185) Revert "[3.13] gh-119452: Fix a potential virtual memory allocation denial of service in http.server (GH-119455) (GH-142130)" This reverts commit 6c922bb.
@miss-islingtonmiss-islington deleted the backport-29c657a-3.13 branch January 2, 2026 17:03
Sign up for freeto join this conversation on GitHub. Already have an account? Sign in to comment

Labels

type-securityA security issue

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants

@miss-islington@serhiy-storchaka