MGASA-2015-0254

Source
https://advisories.mageia.org/MGASA-2015-0254.html
Import Source
https://advisories.mageia.org/MGASA-2015-0254.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2015-0254
Related
Published
2015-07-01T13:23:59Z
Modified
2015-07-09T07:56:53Z
Summary
Updated apache-mod_jk package fixes security vulnerability
Details

An information disclosure flaw due to incorrect JkMount/JkUnmount directives processing was found in the Apache 2 module mod_jk to forward requests from the Apache web server to Tomcat. A JkUnmount rule for a subtree of a previous JkMount rule could be ignored. This could allow a remote attacker to potentially access a private artifact in a tree that would otherwise not be accessible to them (CVE-2014-8111).

References
Credits

Affected packages

Mageia:4 / apache-mod_jk

Package

Name
apache-mod_jk
Purl
pkg:rpm/mageia/apache-mod_jk?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.2.37-6.2.mga4

Ecosystem specific

{
    "section": "core"
}