Synopsis: Moderate: httpd security update
Advisory ID: SLSA-2015:1667-1
Issue Date: 2015-08-24
CVE Numbers: CVE-2015-3183
CVE-2015-3185
—
Multiple flaws were found in the way httpd parsed HTTP requests and
responses using chunked transfer encoding. A remote attacker could use
these flaws to create a specially crafted request, which httpd would
decode differently from an HTTP proxy software in front of it, possibly
leading to HTTP request smuggling attacks. (CVE-2015-3183)
It was discovered that in httpd 2.4, the internal API function
ap_some_auth_required() could incorrectly indicate that a request was
authenticated even when no authentication was used. An httpd module using
this API function could consequently allow access that should have been
denied. (CVE-2015-3185)
After installing the updated packages, the httpd service will be restarted
automatically.
—
SL7
x86_64
httpd-2.4.6-31.sl7.1.x86_64.rpm
httpd-debuginfo-2.4.6-31.sl7.1.x86_64.rpm
httpd-devel-2.4.6-31.sl7.1.x86_64.rpm
httpd-tools-2.4.6-31.sl7.1.x86_64.rpm
mod_ldap-2.4.6-31.sl7.1.x86_64.rpm
mod_proxy_html-2.4.6-31.sl7.1.x86_64.rpm
mod_session-2.4.6-31.sl7.1.x86_64.rpm
mod_ssl-2.4.6-31.sl7.1.x86_64.rpm
noarch
httpd-manual-2.4.6-31.sl7.1.noarch.rpm
– Scientific Linux Development Team