The mod_headers module in the Apache HTTP Server 2.2.22 allows remote attackers to bypass "RequestHeader unset" directives by placing a header in the trailer portion of data sent with chunked transfer coding. NOTE: the vendor states "this is not a security issue in httpd as such."
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "apache2-suexec": "2.4.7-1ubuntu4.4", "apache2-suexec-custom": "2.4.7-1ubuntu4.4", "libapache2-mod-proxy-html": "1:2.4.7-1ubuntu4.4", "apache2-dev": "2.4.7-1ubuntu4.4", "apache2-bin": "2.4.7-1ubuntu4.4", "apache2-suexec-pristine": "2.4.7-1ubuntu4.4", "apache2-doc": "2.4.7-1ubuntu4.4", "apache2-mpm-event": "2.4.7-1ubuntu4.4", "apache2": "2.4.7-1ubuntu4.4", "apache2-dbg": "2.4.7-1ubuntu4.4", "apache2-data": "2.4.7-1ubuntu4.4", "apache2-mpm-prefork": "2.4.7-1ubuntu4.4", "apache2-mpm-itk": "2.4.7-1ubuntu4.4", "libapache2-mod-macro": "1:2.4.7-1ubuntu4.4", "apache2.2-bin": "2.4.7-1ubuntu4.4", "apache2-utils": "2.4.7-1ubuntu4.4", "apache2-mpm-worker": "2.4.7-1ubuntu4.4" } ] }