[Bug 63795] mod_proxy_balancer: disabling balancer member often results in "AH01114: HTTP: failed to make connection to backend"

2020-04-01 Thread bugzilla
https://bz.apache.org/bugzilla/show_bug.cgi?id=63795

Felix  changed:

   What|Removed |Added

 CC||not@gmail.com

-- 
You are receiving this mail because:
You are the assignee for the bug.
-
To unsubscribe, e-mail: bugs-unsubscr...@httpd.apache.org
For additional commands, e-mail: bugs-h...@httpd.apache.org



[Bug 64299] Apache Httpd is not allowing all ip address

2020-04-01 Thread bugzilla
https://bz.apache.org/bugzilla/show_bug.cgi?id=64299

Rich Bowen  changed:

   What|Removed |Added

 OS||All

--- Comment #1 from Rich Bowen  ---
Please provide the error message, from the error log.

-- 
You are receiving this mail because:
You are the assignee for the bug.
-
To unsubscribe, e-mail: bugs-unsubscr...@httpd.apache.org
For additional commands, e-mail: bugs-h...@httpd.apache.org



[Bug 64297] mod_md uninitialized variable

2020-04-01 Thread bugzilla
https://bz.apache.org/bugzilla/show_bug.cgi?id=64297

--- Comment #2 from toan@gmail.com ---
Hi Stefan,
Yeah indeed I think you right, so I dive in md_json_readb and see this

apr_status_t md_json_readd(md_json_t **pjson, apr_pool_t *pool, const char
*data, size_t data_len)
{
json_error_t error;
json_t *j;

j = json_loadb(data, data_len, 0, ); (5)
if (!j) {
return APR_EINVAL;
}
*pjson = json_create(pool, j);
return APR_SUCCESS;
}

so If we go to the branh:
rv = md_json_readb(pjson, pool, res->body);

it will trigger (5) with data is res->body under attacker control and I guess
can make it return 0 and it will keep pjson ( our *problem ) uninit as well.

-- 
You are receiving this mail because:
You are the assignee for the bug.
-
To unsubscribe, e-mail: bugs-unsubscr...@httpd.apache.org
For additional commands, e-mail: bugs-h...@httpd.apache.org



[Bug 64297] mod_md uninitialized variable

2020-04-01 Thread bugzilla
https://bz.apache.org/bugzilla/show_bug.cgi?id=64297

--- Comment #1 from Stefan Eissing  ---
Thanks for your report.

I agree that md_json_read_http() should NULL the pointer if the response is not
of a json content type. I will fix the code accordingly.

As for an attack, the function is only called when a "json" content type has
been detected. I fail to see how an uninitialized *problem could be accessed.
Maybe I am not seeing something?

-- 
You are receiving this mail because:
You are the assignee for the bug.
-
To unsubscribe, e-mail: bugs-unsubscr...@httpd.apache.org
For additional commands, e-mail: bugs-h...@httpd.apache.org



[Bug 64299] New: Apache Httpd is not allowing all ip address

2020-04-01 Thread bugzilla
https://bz.apache.org/bugzilla/show_bug.cgi?id=64299

Bug ID: 64299
   Summary: Apache Httpd is not allowing all ip address
   Product: Apache httpd-2
   Version: 2.4.18
  Hardware: PC
Status: NEW
  Severity: normal
  Priority: P2
 Component: All
  Assignee: bugs@httpd.apache.org
  Reporter: baji.sh...@thomsonreuters.com
  Target Milestone: ---

Dear Team,

we are using apache-httpd-2.4.18_64bit in our project, 

we are getting error(HTTP Internal server error)when trying to send request to
httpd server from assigned IP is 10.8.*, but its working fine when sending
request from assigned IP(10.194 *)

I though there is restriction in config file, so I tried to allow IP address 
10.8.* in virtual host tag, and also tried to grand all access in directory
tag,
but still I am getting the same error.


Could you please help on this issue.

Regards
Bajih

-- 
You are receiving this mail because:
You are the assignee for the bug.
-
To unsubscribe, e-mail: bugs-unsubscr...@httpd.apache.org
For additional commands, e-mail: bugs-h...@httpd.apache.org



[Bug 63687] High Memory usage after upgrade to 2.4.41

2020-04-01 Thread bugzilla
https://bz.apache.org/bugzilla/show_bug.cgi?id=63687

--- Comment #78 from Ruediger Pluem  ---
Maybe the following untested stuff helps you to do this in an unattended way:

gdb 
break sbrk
commands
silent
bt full
cont
end
set logging file 
set logging redirect on
set logging on
cont

-- 
You are receiving this mail because:
You are the assignee for the bug.
-
To unsubscribe, e-mail: bugs-unsubscr...@httpd.apache.org
For additional commands, e-mail: bugs-h...@httpd.apache.org



[Bug 63687] High Memory usage after upgrade to 2.4.41

2020-04-01 Thread bugzilla
https://bz.apache.org/bugzilla/show_bug.cgi?id=63687

--- Comment #77 from Ruediger Pluem  ---
(In reply to Curtis Wilson from comment #76)
> Is there anything else that is needed at this time?

Not now. I am honestly a bit lost now. It looks like that your processes
consume a lot of memory (about 600 MB) from the start due to their
configuration, but from pool usage perspective not much changes between the
freshly started process and the one which consumes the huge amount of memory
(roughly 2.8 GB). So the question is where is this memory lost and why did the
behavior change with the httpd version.

It could be that a 3rd party module consumes memory outside the pools, but due
to sideeffects introduced by the newer httpd version does not free up that
memory any longer or it is caused by the underlying memory management of the c
library, but then it should show up the same way with both httpd version. So
this is the rather unlikely option. Maybe we are left to the proposal from Joe:

Have a fresh process handle some requests to "warm up" a little bit memory wise
and then do https://bz.apache.org/bugzilla/show_bug.cgi?id=63687#c62 with that
process and see where it stops over and over again.

-- 
You are receiving this mail because:
You are the assignee for the bug.
-
To unsubscribe, e-mail: bugs-unsubscr...@httpd.apache.org
For additional commands, e-mail: bugs-h...@httpd.apache.org



[Bug 64297] New: mod_md uninitialized variable

2020-04-01 Thread bugzilla
https://bz.apache.org/bugzilla/show_bug.cgi?id=64297

Bug ID: 64297
   Summary: mod_md uninitialized variable
   Product: Apache httpd-2
   Version: 2.5-HEAD
  Hardware: All
OS: All
Status: NEW
  Severity: critical
  Priority: P2
 Component: mod_md
  Assignee: bugs@httpd.apache.org
  Reporter: toan@gmail.com
  Target Milestone: ---

Hi,
When auditing httpd I caught this bug,
https://github.com/apache/httpd/blob/trunk/modules/md/md_acme.c#L170
static apr_status_t inspect_problem(md_acme_req_t *req, const
md_http_response_t *res)
{
const char *ctype;
md_json_t *problem; (1)

ctype = apr_table_get(req->resp_hdrs, "content-type");
if (ctype && !strcmp(ctype, "application/problem+json")) {
/* RFC 7807 */
md_json_read_http(, req->p, res); (2)
if (problem) { (3)
const char *ptype, *pdetail;



https://github.com/apache/httpd/blob/trunk/modules/md/md_json.c#L1160
apr_status_t md_json_read_http(md_json_t **pjson, apr_pool_t *pool, const
md_http_response_t *res)
{
apr_status_t rv = APR_ENOENT;
const char *ctype = apr_table_get(res->headers, "content-type");
if (ctype && res->body (4) && (strstr(ctype, "/json") || strstr(ctype,
"+json"))) {
rv = md_json_readb(pjson, pool, res->body);
}
return rv;
Variable problem uninitialized at (1) and pass as a pointer to
md_json_read_http at (2), if res->body is null at (4) it will return APR_ENOENT
without init pjson( or problem ).
At (3) use [problem] without any check on return value of md_json_read_http so
[problem] never get init.


It look like if attacker can control authority server he can exploit this bug.

-- 
You are receiving this mail because:
You are the assignee for the bug.
-
To unsubscribe, e-mail: bugs-unsubscr...@httpd.apache.org
For additional commands, e-mail: bugs-h...@httpd.apache.org