From ${URL}: Hi, there appears to be at least a denial-of-service vulnerability in fcgi: https://bugzilla.redhat.com/show_bug.cgi?id=1189958 Can someone pleas assign a CVE id to this, to make sure that other distributions notice this problem as well. Unfortunately it looks like fastcgi upstream now died, as their mailing list is not reachable anymore: http://mailman.fastcgi.com/mailman/listinfo/fastcgi-developers So if someone knows how to contact them, please forward them this information. Regards Till Maas - -- From https://bugzilla.redhat.com/show_bug.cgi?id=1190294: It is reported that fcgi will segmentation fault when 1000 connections are established due to use of select() rather than poll(). External references: https://bugs.launchpad.net/ubuntu/+source/libfcgi/+bug/933417 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681591
working on it
The patch provided does not applies cleanly to our version of fcgi (it is a snapshot). I ported it and revbumped to =dev-libs/fcgi-2.4.1_pre0910052249-r2.
(In reply to Rafael Martins from comment #2) > The patch provided does not applies cleanly to our version of fcgi (it is a > snapshot). I ported it and revbumped to > =dev-libs/fcgi-2.4.1_pre0910052249-r2. Thanks. Is it ready for stabilization?
(In reply to Kristian Fiskerstrand from comment #3) > (In reply to Rafael Martins from comment #2) > > The patch provided does not applies cleanly to our version of fcgi (it is a > > snapshot). I ported it and revbumped to > > =dev-libs/fcgi-2.4.1_pre0910052249-r2. > > Thanks. Is it ready for stabilization? i think so
Arches, please stabilize: =dev-libs/fcgi-2.4.1_pre0910052249-r2 Stable arches: alpha amd64 arm hppa ia64 ppc ppc64 sparc x86
amd64 stable
Stable for HPPA.
x86 stable
sparc stable
arm stable
ppc64 stable
ppc stable
ia64 stable
alpha stable. Maintainer(s), please cleanup. Security, please vote.
Arches, Thank you for your work. First Vote: No Maintainer(s), please drop the vulnerable version(s).
vulnerable ebuild removed. thanks
Arches and Maintainer(s), Thank you for your work.
GLSA vote: no. Closing as [noglsa]
CVE-2012-6687 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6687): FastCGI (aka fcgi and libfcgi) 2.4.0 allows remote attackers to cause a denial of service (segmentation fault and crash) via a large number of connections.