MGASA-2014-0527

Source
https://advisories.mageia.org/MGASA-2014-0527.html
Import Source
https://advisories.mageia.org/MGASA-2014-0527.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2014-0527
Related
Published
2014-12-13T20:16:05Z
Modified
2014-12-13T20:08:45Z
Summary
Updated apache packages fix security vulnerabilities
Details

Updated apache packages fix security vulnerabilities:

A NULL pointer dereference flaw was found in the way the mod_cache httpd module handled Content-Type headers. A malicious HTTP server could cause the httpd child process to crash when the Apache HTTP server was configured to proxy to a server with caching enabled (CVE-2014-3581).

A flaw was found in the way httpd handled HTTP Trailer headers when processing requests using chunked encoding. A malicious client could use Trailer headers to set additional HTTP headers after header processing was performed by other modules. This could, for example, lead to a bypass of header restrictions defined with mod_headers (CVE-2013-5704).

Note: With this update, httpd has been modified to not merge HTTP Trailer headers with other HTTP request headers. A newly introduced configuration directive MergeTrailers can be used to re-enable the old method of processing Trailer headers, which also re-introduces the aforementioned flaw.

This update also fixes the following bug:

Prior to this update, the modproxywstunnel module failed to set up an SSL connection when configured to use a back end server using the "wss:" URL scheme, causing proxied connections to fail. In these updated packages, SSL is used when proxying to "wss:" back end servers (rhbz#1141950).

References
Credits

Affected packages

Mageia:4 / apache

Package

Name
apache
Purl
pkg:rpm/mageia/apache?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.4.7-5.4.mga4

Ecosystem specific

{
    "section": "core"
}