Bug 579533 (CVE-2009-2936)
| Summary: | CVE-2009-2936 Varnish reverse proxy flaw | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Josh Bressers <bressers> |
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
| Status: | CLOSED ERRATA | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | unspecified | CC: | ingvar, jrusnack |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | Bug Fix | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2014-11-28 00:12:17 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 579536 | ||
| Bug Blocks: | |||
|
Description
Josh Bressers
2010-04-05 18:50:09 UTC
varnish-2.1.0-2.fc13 has been submitted as an update for Fedora 13. http://admin.fedoraproject.org/updates/varnish-2.1.0-2.fc13 This was fixed for epel6+ and fedora long time ago. For varnish-2.0.6 on epel5, this "bug" is not available for remote attacks. The default configuration delivered for varnish on epel5 makes the admin port only available on 127.0.0.1 and ::1. To enable remote access, a varnish system admin will have to actively change the admin interface to a remotely available address and port. Local users will still be able to access and change varnish as described without authorization. As upstream disputes that this actually is a real world problem, I'm not going to do anything more on this bug, unless explicitly requested. (If there are real world users with varnish on el5 systems, they are probably using a newer version of varnish already anyway.) Ingvar |