[CVE] Correctly handle bogusly large chunk sizes
Bug #1708354 reported by
Poil
This bug affects 6 people
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
varnish (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned | ||
Xenial |
Fix Released
|
Medium
|
Simon Quigley | ||
Zesty |
Fix Released
|
Medium
|
Simon Quigley |
Bug Description
https:/
CVE-2017-12425
Date: 2017-08-02
A wrong if statement in the varnishd source code means that particular invalid requests from the client can trigger an assert.
This causes the varnishd worker process to abort and restart, loosing the cached contents in the process.
An attacker can therefore crash the varnishd worker process on demand and effectively keep it from serving content - a Denial-of-Service attack.
Mitigation is possible from VCL or by updating to a fixed version of Varnish Cache.
Versions affected
4.0.1 to 4.0.4
4.1.0 to 4.1.7
5.0.0
5.1.0 to 5.1.2
CVE References
information type: | Private Security → Public Security |
Changed in varnish (Ubuntu): | |
status: | Incomplete → Opinion |
status: | Opinion → In Progress |
description: | updated |
Changed in varnish (Ubuntu): | |
status: | In Progress → Fix Released |
Changed in varnish (Ubuntu Xenial): | |
status: | New → In Progress |
Changed in varnish (Ubuntu Zesty): | |
status: | New → In Progress |
Changed in varnish (Ubuntu Xenial): | |
assignee: | nobody → Simon Quigley (tsimonq2) |
Changed in varnish (Ubuntu Zesty): | |
assignee: | nobody → Simon Quigley (tsimonq2) |
Changed in varnish (Ubuntu Xenial): | |
importance: | Undecided → Medium |
Changed in varnish (Ubuntu Zesty): | |
importance: | Undecided → Medium |
Changed in varnish (Ubuntu Zesty): | |
status: | In Progress → Fix Committed |
To post a comment you must log in.
Thanks for taking the time to report this bug and helping to make Ubuntu better. Since the package referred to in this bug is in universe or multiverse, it is community maintained. If you are able, I suggest coordinating with upstream and posting a debdiff for this issue. When a debdiff is available, members of the security team will review it and publish the package. See the following link for more information: https:/ /wiki.ubuntu. com/SecurityTea m/UpdateProcedu res