From ${URL} : The following flaw has been fixed in the Apache HTTP Server: "A buffer overflow was found in mod_proxy_fcgi. A malicious FastCGI server could send a carefully crafted response which could lead to a heap buffer overflow." Patch for trunk: http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_fcgi.c?r1=1618401&r2=1638818 External References: http://httpd.apache.org/security/vulnerabilities_24.html @maintainer(s): after the bump, in case we need to stabilize the package, please let us know if it is ready for the stabilization or not.
CVE-2014-3583 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3583): The handle_headers function in mod_proxy_fcgi.c in the mod_proxy_fcgi module in the Apache HTTP Server 2.4.10 allows remote FastCGI servers to cause a denial of service (buffer over-read and daemon crash) via long response headers.
2.4 versions in the tree are not affected by this. I wonder about www-apache/mod_proxy_fcgi being affected by this :/
Does the version www-servers/apache-2.4.23 contain this fix. I would like to close the bug if this is fixed.
Please advise on this bug.
This was fixed in version 2.4.10
This issue was resolved and addressed in GLSA 201701-36 at https://security.gentoo.org/glsa/201701-36 by GLSA coordinator Aaron Bauman (b-man).