Print

Print


Synopsis:          Moderate: httpd security update
Advisory ID:       SLSA-2015:1667-1
Issue Date:        2015-08-24
CVE Numbers:       CVE-2015-3183
                   CVE-2015-3185
--

Multiple flaws were found in the way httpd parsed HTTP requests and
responses using chunked transfer encoding. A remote attacker could use
these flaws to create a specially crafted request, which httpd would
decode differently from an HTTP proxy software in front of it, possibly
leading to HTTP request smuggling attacks. (CVE-2015-3183)

It was discovered that in httpd 2.4, the internal API function
ap_some_auth_required() could incorrectly indicate that a request was
authenticated even when no authentication was used. An httpd module using
this API function could consequently allow access that should have been
denied. (CVE-2015-3185)

After installing the updated packages, the httpd service will be restarted
automatically.
--

SL7
  x86_64
    httpd-2.4.6-31.sl7.1.x86_64.rpm
    httpd-debuginfo-2.4.6-31.sl7.1.x86_64.rpm
    httpd-devel-2.4.6-31.sl7.1.x86_64.rpm
    httpd-tools-2.4.6-31.sl7.1.x86_64.rpm
    mod_ldap-2.4.6-31.sl7.1.x86_64.rpm
    mod_proxy_html-2.4.6-31.sl7.1.x86_64.rpm
    mod_session-2.4.6-31.sl7.1.x86_64.rpm
    mod_ssl-2.4.6-31.sl7.1.x86_64.rpm
  noarch
    httpd-manual-2.4.6-31.sl7.1.noarch.rpm

- Scientific Linux Development Team