A heap-based buffer overflow flaw was reported (including a reproducer) in varnish, a high-performance HTTP accelerator:
Created varnish tracking bugs for this issue:
Affects: fedora-all [bug 1200035]
Affects: epel-all [bug 1200036]
* I have contacted upstream, and talked to Poul-Henning Kamp. His preliminary response:
"I don't consider this a security issue. Two reasons: 1. it's the backend,
2. I cannot see any way to exploit it. It's just a crash that shouldn't
That varnish trusts the backends has been discussed several times on the
oss-sec mailing list. I think that is out of scope for this bug.
He has also had a look at the code that provokes the actual crash, and
may eventually produce a patch fixing it.
* I have not been able to reproduce the crash locally.
* I have contacted the reporter. He is not able to reproduce the crash at
will. The bug is trigged with "magic numbers" as done in the reproducing
script, but the actual numbers to use may depend on the VM layout on the
specific machine. He should try to make a more predictable way to trig the
bug, and come back to me if he manages.
Based on this, I let this bug rest as NEW until I get more information.
Patch based on upstream commit 9d61ea4d722549a984d912603902fccfac473824 added. varnish-4.0.3-3 pushed to testing f21, f22, and epel7.
varnish-4.0.3-3.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report.
varnish-4.0.3-3 updates have had status stable in fc21, fc22, el7, for 64 days. I'm closing this now.