tag 683984 +pending
thanks

06.08.2012 4:27 пользователь "Luciano Bello" <luci...@debian.org> написал:
> Sébastien Bocahu reported to the security team:
> > (...)
> > A single request makes Apache segfault. On some of the environments I 
> tested,
> > it even kills all Apache processes (they become zombies).

Thank you for bugreport.

> > The magick request is the following:
> >   curl -H "x-forwarded-for: 1'\"5000" -H "Host: a.vhost.example.com"
> >   reverseproxy
> >
> > Apache processes will segfault, hence a potential DOS issue.

This works for very typical setups.  Bad news.  And it looks as a ("potential",
yeh) remote hole.

> > From my experiments, version 0.6 fixes the issue (IPv6 patched or 
> unpatched).

Yep.  Tag this as fixed for 0.6+ debian packages.

> Please, prepare a minimal patch for stable

The "minimal" patch is to drop 030_ipv6.patch.  I can't confirm that
this bug is *not* reproducible for 0.6 version *with* the above patch.

Can you ask bugreporter to report details on:
-->8--
   rpaf 0.6 is available in Debian wheezy. The IPv6 patched is not applied
   though. I patched myself and tested it on the       
   same squeeze environment: there is no more segfaults.
-->8--
?
Unmodified 030_ipv6.patch still produce segfaults on 0.6+, for me.

> and contact the security team to
> update the package.

Reply to contacts of this bugreport is ok, or I should do anything else?


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to