mod_auth_mellon provides a SAML 2.0 authentication module for the Apache
HTTP Server.
An information disclosure flaw was found in mod_auth_mellon’s session
handling that could lead to sessions overlapping in memory. A remote
attacker could potentially use this flaw to obtain data from another user’s
session. (CVE-2014-8566)
It was found that uninitialized data could be read when processing a user’s
logout request. By attempting to log out, a user could possibly cause the
Apache HTTP Server to crash. (CVE-2014-8567)
Red Hat would like to thank the mod_auth_mellon team for reporting these
issues. Upstream acknowledges Matthew Slowe as the original reporter of
CVE-2014-8566.
All users of mod_auth_mellon are advised to upgrade to this updated
package, which contains a backported patch to correct these issues.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
RedHat | 6 | x86_64 | mod_auth_mellon | < 0.8.0-3.el6_6 | mod_auth_mellon-0.8.0-3.el6_6.x86_64.rpm |
RedHat | 6 | i686 | mod_auth_mellon | < 0.8.0-3.el6_6 | mod_auth_mellon-0.8.0-3.el6_6.i686.rpm |
RedHat | 6 | x86_64 | mod_auth_mellon-debuginfo | < 0.8.0-3.el6_6 | mod_auth_mellon-debuginfo-0.8.0-3.el6_6.x86_64.rpm |
RedHat | 6 | ppc64 | mod_auth_mellon | < 0.8.0-3.el6_6 | mod_auth_mellon-0.8.0-3.el6_6.ppc64.rpm |
RedHat | 6 | ppc64 | mod_auth_mellon-debuginfo | < 0.8.0-3.el6_6 | mod_auth_mellon-debuginfo-0.8.0-3.el6_6.ppc64.rpm |
RedHat | 6 | i686 | mod_auth_mellon-debuginfo | < 0.8.0-3.el6_6 | mod_auth_mellon-debuginfo-0.8.0-3.el6_6.i686.rpm |
RedHat | 6 | src | mod_auth_mellon | < 0.8.0-3.el6_6 | mod_auth_mellon-0.8.0-3.el6_6.src.rpm |
RedHat | 6 | s390x | mod_auth_mellon-debuginfo | < 0.8.0-3.el6_6 | mod_auth_mellon-debuginfo-0.8.0-3.el6_6.s390x.rpm |
RedHat | 6 | s390x | mod_auth_mellon | < 0.8.0-3.el6_6 | mod_auth_mellon-0.8.0-3.el6_6.s390x.rpm |