A heap-based buffer overflow flaw was reported (including a reproducer) in varnish, a high-performance HTTP accelerator: http://seclists.org/oss-sec/2015/q1/776
Created varnish tracking bugs for this issue: Affects: fedora-all [bug 1200035] Affects: epel-all [bug 1200036]
* I have contacted upstream, and talked to Poul-Henning Kamp. His preliminary response: "I don't consider this a security issue. Two reasons: 1. it's the backend, 2. I cannot see any way to exploit it. It's just a crash that shouldn't happen IMO." That varnish trusts the backends has been discussed several times on the oss-sec mailing list. I think that is out of scope for this bug. He has also had a look at the code that provokes the actual crash, and may eventually produce a patch fixing it. * I have not been able to reproduce the crash locally. * I have contacted the reporter. He is not able to reproduce the crash at will. The bug is trigged with "magic numbers" as done in the reproducing script, but the actual numbers to use may depend on the VM layout on the specific machine. He should try to make a more predictable way to trig the bug, and come back to me if he manages. Based on this, I let this bug rest as NEW until I get more information. Ingvar
Patch based on upstream commit 9d61ea4d722549a984d912603902fccfac473824 added. varnish-4.0.3-3 pushed to testing f21, f22, and epel7. Ingvar
varnish-4.0.3-3.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report.
varnish-4.0.3-3 updates have had status stable in fc21, fc22, el7, for 64 days. I'm closing this now.