Varnish Cache a high-performance HTTP accelerator. A denial of service flaw was found in the way Varnish Cache handled certain GET requests when using certain configurations. A remote attacker could use this flaw to crash a worker process. References: https://www.varnish-cache.org/trac/ticket/1367 https://www.varnish-cache.org/trac/changeset/4bd5b7991bf602a6c46dd0d65fc04d4b8d9667a6 https://www.varnish-cache.org/trac/changeset/9c9a9904bdb56b62017f338baf9c8e906b88dcac
3.0.5 released today, should have the fix.
(In reply to Chris Reffett from comment #1) > 3.0.5 released today, should have the fix. I added it to the tree and tested. Please rapid stabilize for amd64 and x86.
Arches, please test and mark stable: =www-servers/varnish-3.0.5 Target Keywords : "amd64 x86"
amd64 stable
x86 stable. Maintainer(s), please cleanup. Security, please vote.
(In reply to Agostino Sarubbo from comment #5) > x86 stable. > > Maintainer(s), please cleanup. > Security, please vote. Only 3.0.5 is in the tree.
Thanks for your work. GLSA vote: yes
CVE-2013-4484 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4484): Varnish before 3.0.5 allows remote attackers to cause a denial of service (child-process crash and temporary caching outage) via a GET request with trailing whitespace characters and no URI.
Arches and Maintainer(s), Thank you for your work. New GLSA Request filed.
GLSA Vote: Yes
This issue was resolved and addressed in GLSA 201412-30 at http://security.gentoo.org/glsa/glsa-201412-30.xml by GLSA coordinator Mikle Kolyada (Zlogene).