Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1513523 - (CVE-2017-8807) CVE-2017-8807 varnish: Data leak - ‘-sfile’ Stevedore transient objects
CVE-2017-8807 varnish: Data leak - ‘-sfile’ Stevedore transient objects
Status: CLOSED NOTABUG
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20171115,repor...
: Security
Depends On: 1513524
Blocks:
  Show dependency treegraph
 
Reported: 2017-11-15 10:09 EST by Adam Mariš
Modified: 2018-05-04 09:11 EDT (History)
4 users (show)

See Also:
Fixed In Version: varnish 4.1.9, varnish 5.2.1
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2018-05-03 06:48:12 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Adam Mariš 2017-11-15 10:09:12 EST
A wrong if statement in the varnishd source code means that synthetic objects in stevedores which over-allocate, may leak up to page size of data from a malloc(3) memory allocation.

In a unpredictable percentage of the cases where this condition arises, a segmentation fault will happen instead.

All the following conditions are required to trigger the problem:

    A -sfile or -spersistent stevedore must be configured
    A synthetic object must be created in vcl_backend_error{}
    The synthetic object ends up in the file or persistent stevedore.

For the third condition can arise in two different ways:

    The stevedore named Transient is configured as -sfile or -spersistent (The default is -smalloc)
    The default stevedore is -sfile or -spersistent and the synthetic object is given a TTL larger than the shortlived parameter (default: 10 seconds.)

Affected versions: 4.1.0 to 5.2.0

Upstream patch:

https://github.com/varnishcache/varnish-cache/commit/176f8a075a

External References:

https://varnish-cache.org/security/VSV00002.html
Comment 1 Adam Mariš 2017-11-15 10:09:24 EST
Acknowledgments:

Name: the Varnish project
Comment 2 Adam Mariš 2017-11-15 10:09:43 EST
Created varnish tracking bugs for this issue:

Affects: fedora-all [bug 1513524]

Note You need to log in before you can comment on or make changes to this bug.