Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2015-1249

Опубликовано: 28 июл. 2015
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2015-1249: httpd security, bug fix, and enhancement update (LOW)

[2.2.15-45.0.1]

  • replace index.html with Oracle's index page oracle_index.html
  • update vstring in specfile

[2.2.15-45]

  • mod_proxy_balancer: add support for 'drain mode' (N) (#767130)

[2.2.15-44]

  • set SSLCipherSuite to DEFAULT:!EXP:!SSLv2:!DES:!IDEA:!SEED:+3DES (#1086771)

[2.2.15-43]

  • revert DirectoryMatch patch from 2.2.15-40 (#1016963)

[2.2.15-42]

  • core: fix bypassing of mod_headers rules via chunked requests (CVE-2013-5704)

[2.2.15-41]

  • fix compilation with older OpenSSL caused by misspelling in patch (#1162268)

[2.2.15-40]

  • mod_proxy: do not mix workers shared memory during graceful restart (#1149906)
  • mod_ssl: Fix SSL_CLIENT_VERIFY value when optional_no_ca and SSLSessionCache are used and SSL session is resumed (#1149703)
  • mod_ssl: log revoked certificates at the INFO level (#1161328)
  • mod_ssl: use -extensions v3_req for certificate generation (#906476)
  • core: check the config file before restarting the server (#1146194)
  • core: do not match files when using DirectoryMatch (#1016963)
  • core: improve error message for inaccessible DocumentRoot (#987590)
  • rotatelogs: improve support for localtime (#922844)
  • mod_deflate: fix decompression of files larger than 4GB (#1057695)
  • ab: fix integer overflow when printing stats with lot of requests (#1092419)
  • ab: try all addresses instead of failing on first one when not available (#1125269)
  • ab: fix read failure when targeting SSL server (#1045477)
  • apachectl: support HTTPD_LANG variable from /etc/sysconfig/httpd (#963146)
  • do not display 'bomb' icon for files ending with 'core' (#1069625)

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

httpd

2.2.15-45.0.1.el6

httpd-devel

2.2.15-45.0.1.el6

httpd-manual

2.2.15-45.0.1.el6

httpd-tools

2.2.15-45.0.1.el6

mod_ssl

2.2.15-45.0.1.el6

Oracle Linux i686

httpd

2.2.15-45.0.1.el6

httpd-devel

2.2.15-45.0.1.el6

httpd-manual

2.2.15-45.0.1.el6

httpd-tools

2.2.15-45.0.1.el6

mod_ssl

2.2.15-45.0.1.el6

Связанные CVE

Связанные уязвимости

ubuntu
больше 11 лет назад

The mod_headers module in the Apache HTTP Server 2.2.22 allows remote attackers to bypass "RequestHeader unset" directives by placing a header in the trailer portion of data sent with chunked transfer coding. NOTE: the vendor states "this is not a security issue in httpd as such."

redhat
почти 12 лет назад

The mod_headers module in the Apache HTTP Server 2.2.22 allows remote attackers to bypass "RequestHeader unset" directives by placing a header in the trailer portion of data sent with chunked transfer coding. NOTE: the vendor states "this is not a security issue in httpd as such."

nvd
больше 11 лет назад

The mod_headers module in the Apache HTTP Server 2.2.22 allows remote attackers to bypass "RequestHeader unset" directives by placing a header in the trailer portion of data sent with chunked transfer coding. NOTE: the vendor states "this is not a security issue in httpd as such."

debian
больше 11 лет назад

The mod_headers module in the Apache HTTP Server 2.2.22 allows remote ...

github
больше 3 лет назад

The mod_headers module in the Apache HTTP Server 2.2.22 allows remote attackers to bypass "RequestHeader unset" directives by placing a header in the trailer portion of data sent with chunked transfer coding. NOTE: the vendor states "this is not a security issue in httpd as such."