Bug 242606 (CVE-2007-1862) - CVE-2007-1862 httpd's mod_mem_cache sensitive information disclosure
Summary: CVE-2007-1862 httpd's mod_mem_cache sensitive information disclosure
Alias: CVE-2007-1862
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL: http://issues.apache.org/bugzilla/sho...
Depends On: 244660 245127
TreeView+ depends on / blocked
Reported: 2007-06-05 01:02 UTC by Lubomir Kundrak
Modified: 2008-01-16 17:16 UTC (History)
1 user (show)

Fixed In Version: 2.2.4-4.1.fc7
Doc Type: Bug Fix
Doc Text:
Clone Of:
Last Closed: 2008-01-16 17:16:30 UTC

Attachments (Terms of Use)

System ID Private Priority Status Summary Last Updated
Apache Bugzilla 41551 0 None None None Never

Description Lubomir Kundrak 2007-06-05 01:02:39 UTC
Description of problem:

mod_mem_cache module in Apache httpd-2.2.4 could return headers from cache
pool objects that were already cleaned up and used for other purposes
possibly disclosing sensitive information.

The change that caused this flaw was introduced in revision 484642 [1] and
reverted in revision 543515 [2].

[1] http://svn.apache.org/viewvc?view=rev&revision=484642
[2] http://svn.apache.org/viewvc?view=rev&revision=543515

Version-Release number of selected component (if applicable):

httpd-2.2.4 and thus:

        CVE-2007-1862 Doesn't Affect: FC5
        CVE-2007-1862 Affects: FC6
        CVE-2007-1862 Affects: FC7

How reproducible:


Comment 1 Fedora Update System 2007-06-27 03:52:44 UTC
httpd-2.2.4-4.1.fc7 has been pushed to the Fedora 7 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 4 Tomas Hoger 2008-01-16 17:16:30 UTC
This issue was specific to httpd version 2.2.4 and did not affect the versions
of httpd as shipped with Red Hat Enterprise Linux 2.1, 3, 4 or 5 and Red Hat
Application Stack v1.

Version of httpd as shipped with Red Hat Application Stack v2 was fixed prior to
its first release.

Note You need to log in before you can comment on or make changes to this bug.