tag 683984 +pending
thanks
06.08.2012 4:27 пользователь "Luciano Bello" <[email protected]> написал:
> Sébastien Bocahu reported to the security team:
> > (...)
> > A single request makes Apache segfault. On some of the environments I
> tested,
> > it even kills all Apache processes (they become zombies).
Thank you for bugreport.
> > The magick request is the following:
> > curl -H "x-forwarded-for: 1'\"5000" -H "Host: a.vhost.example.com"
> > reverseproxy
> >
> > Apache processes will segfault, hence a potential DOS issue.
This works for very typical setups. Bad news. And it looks as a ("potential",
yeh) remote hole.
> > From my experiments, version 0.6 fixes the issue (IPv6 patched or
> unpatched).
Yep. Tag this as fixed for 0.6+ debian packages.
> Please, prepare a minimal patch for stable
The "minimal" patch is to drop 030_ipv6.patch. I can't confirm that
this bug is *not* reproducible for 0.6 version *with* the above patch.
Can you ask bugreporter to report details on:
-->8--
rpaf 0.6 is available in Debian wheezy. The IPv6 patched is not applied
though. I patched myself and tested it on the
same squeeze environment: there is no more segfaults.
-->8--
?
Unmodified 030_ipv6.patch still produce segfaults on 0.6+, for me.
> and contact the security team to
> update the package.
Reply to contacts of this bugreport is ok, or I should do anything else?
--
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected]