[apache2] 01/04: CVE-2014-3581: mod_cache DoS
Stefan Fritsch
sf at moszumanska.debian.org
Sun Sep 28 20:46:08 UTC 2014
This is an automated email from the git hooks/post-receive script.
sf pushed a commit to branch master
in repository apache2.
commit 421251bae25f2ec2f049efd6f171c117fd38fa58
Author: Stefan Fritsch <sf at sfritsch.de>
Date: Sun Sep 28 22:25:11 2014 +0200
CVE-2014-3581: mod_cache DoS
---
debian/changelog | 1 +
debian/patches/CVE-2014-3581.patch | 37 +++++++++++++++++++++++++++++++++++++
debian/patches/series | 1 +
3 files changed, 39 insertions(+)
diff --git a/debian/changelog b/debian/changelog
index fbc1bd6..133af62 100644
--- a/debian/changelog
+++ b/debian/changelog
@@ -1,5 +1,6 @@
apache2 (2.4.10-3) UNRELEASED; urgency=medium
+ * CVE-2014-3581: Fix a DoS in mod_cache.
* If apache2 is not configured yet, defer actions executed via
apache2-maintscript-helper. This fixes installation failures if a
module package is configured first. Closes: #745834
diff --git a/debian/patches/CVE-2014-3581.patch b/debian/patches/CVE-2014-3581.patch
new file mode 100644
index 0000000..c0d3499
--- /dev/null
+++ b/debian/patches/CVE-2014-3581.patch
@@ -0,0 +1,37 @@
+#commit c164ca7383d5f204915d85a5826655d3f1557148
+#Author: Jim Jagielski <jim at apache.org>
+#Date: Fri Sep 26 11:00:14 2014 +0000
+#
+# Merge r1624234 from trunk:
+#
+# SECURITY (CVE-2014-3581): Fix a mod_cache NULL pointer deference
+# in Content-Type handling.
+#
+# mod_cache: Avoid a crash when Content-Type has an empty value. PR56924.
+#
+# Submitted By: Mark Montague <mark catseye.org>
+# Reviewed By: Jan Kaluza
+#
+# Submitted by: jkaluza
+# Reviewed/backported by: jim
+#
+#
+# git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/branches/2.4.x@1627749 13f79535-47bb-0310-9956-ffa450edef68
+#
+diff --git a/modules/cache/cache_util.c b/modules/cache/cache_util.c
+index 6368af0..b7454ad 100644
+--- a/modules/cache/cache_util.c
++++ b/modules/cache/cache_util.c
+@@ -1258,8 +1258,10 @@ apr_table_t *cache_merge_headers_out(request_rec *r)
+
+ if (r->content_type
+ && !apr_table_get(headers_out, "Content-Type")) {
+- apr_table_setn(headers_out, "Content-Type",
+- ap_make_content_type(r, r->content_type));
++ const char *ctype = ap_make_content_type(r, r->content_type);
++ if (ctype) {
++ apr_table_setn(headers_out, "Content-Type", ctype);
++ }
+ }
+
+ if (r->content_encoding
diff --git a/debian/patches/series b/debian/patches/series
index 9945c54..7f640a7 100644
--- a/debian/patches/series
+++ b/debian/patches/series
@@ -4,5 +4,6 @@ suexec-CVE-2007-1742.patch
customize_apxs.patch
build_suexec-custom.patch
pull_upstream_2.4.x_branch.patch
+CVE-2014-3581.patch
# This patch is applied manually
#suexec-custom.patch
--
Alioth's /usr/local/bin/git-commit-notice on /srv/git.debian.org/git/pkg-apache/apache2.git
More information about the Pkg-apache-commits
mailing list