An error in the Apache Tomcat JK Connector might allow for an information disclosure flaw.
|Package||www-apache/mod_jk on all architectures|
|Affected versions||< 1.2.27|
|Unaffected versions||>= 1.2.27|
The Apache Tomcat JK Connector (aka mod_jk) connects the Tomcat application server with the Apache HTTP Server.
The Red Hat Security Response Team discovered that mod_jk does not properly handle (1) requests setting the "Content-Length" header while not providing data and (2) clients sending repeated requests very quickly.
A remote attacker could send specially crafted requests or a large number of requests at a time, possibly resulting in the disclosure of a response intended for another client.
There is no known workaround at this time.
All Apache Tomcat JK Connector users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=www-apache/mod_jk-1.2.27"
June 29, 2009
June 29, 2009: 01