Описание
ELSA-2015-1667: httpd security update (MODERATE)
[2.4.6-31.0.1.el7_1.1]
- replace index.html with Oracle's index page oracle_index.html
[2.4.6-31.1]
- core: fix chunk header parsing defect (CVE-2015-3183)
- core: replace of ap_some_auth_required with ap_some_authn_required and ap_force_authn hook (CVE-2015-3185)
Обновленные пакеты
Oracle Linux 7
Oracle Linux x86_64
httpd
2.4.6-31.0.1.el7_1.1
httpd-devel
2.4.6-31.0.1.el7_1.1
httpd-manual
2.4.6-31.0.1.el7_1.1
httpd-tools
2.4.6-31.0.1.el7_1.1
mod_ldap
2.4.6-31.0.1.el7_1.1
mod_proxy_html
2.4.6-31.0.1.el7_1.1
mod_session
2.4.6-31.0.1.el7_1.1
mod_ssl
2.4.6-31.0.1.el7_1.1
Связанные CVE
Связанные уязвимости
The ap_some_auth_required function in server/request.c in the Apache HTTP Server 2.4.x before 2.4.14 does not consider that a Require directive may be associated with an authorization setting rather than an authentication setting, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging the presence of a module that relies on the 2.2 API behavior.
The ap_some_auth_required function in server/request.c in the Apache HTTP Server 2.4.x before 2.4.14 does not consider that a Require directive may be associated with an authorization setting rather than an authentication setting, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging the presence of a module that relies on the 2.2 API behavior.
The ap_some_auth_required function in server/request.c in the Apache HTTP Server 2.4.x before 2.4.14 does not consider that a Require directive may be associated with an authorization setting rather than an authentication setting, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging the presence of a module that relies on the 2.2 API behavior.