You are viewing a plain text version of this content. The canonical link for it is here.
Posted to cvs@httpd.apache.org by bu...@apache.org on 2015/07/29 01:27:40 UTC

svn commit: r959945 - in /websites/staging/httpd/trunk/content: ./ images/icing.png security/vulnerabilities-httpd.xml security/vulnerabilities_22.html

Author: buildbot
Date: Tue Jul 28 23:27:40 2015
New Revision: 959945

Log:
Staging update by buildbot for httpd

Added:
    websites/staging/httpd/trunk/content/images/icing.png   (with props)
Modified:
    websites/staging/httpd/trunk/content/   (props changed)
    websites/staging/httpd/trunk/content/security/vulnerabilities-httpd.xml
    websites/staging/httpd/trunk/content/security/vulnerabilities_22.html

Propchange: websites/staging/httpd/trunk/content/
------------------------------------------------------------------------------
--- cms:source-revision (original)
+++ cms:source-revision Tue Jul 28 23:27:40 2015
@@ -1 +1 @@
-1691603
+1693168

Added: websites/staging/httpd/trunk/content/images/icing.png
==============================================================================
Binary file - no diff available.

Propchange: websites/staging/httpd/trunk/content/images/icing.png
------------------------------------------------------------------------------
    svn:mime-type = image/png

Modified: websites/staging/httpd/trunk/content/security/vulnerabilities-httpd.xml
==============================================================================
--- websites/staging/httpd/trunk/content/security/vulnerabilities-httpd.xml (original)
+++ websites/staging/httpd/trunk/content/security/vulnerabilities-httpd.xml Tue Jul 28 23:27:40 2015
@@ -67,6 +67,50 @@ This issue was reported by Régis Lero
 </acknowledgements>
 </issue>
 
+<issue fixed="2.2.31" reported="20150404" public="20150609" released="20150716">
+<cve name="CVE-2015-3183"/>
+<severity level="4">low</severity>
+<title>HTTP request smuggling attack against chunked request parser</title>
+<description><p>
+
+  An HTTP request smuggling attack was possible due to a bug in parsing of
+  chunked requests.  A malicious client could force the server to
+  misinterpret the request length, allowing cache poisoning or
+  credential hijacking if an intermediary proxy is in use.
+  
+</p></description>
+<affects prod="httpd" version="2.2.29"/>
+<affects prod="httpd" version="2.2.27"/>
+<affects prod="httpd" version="2.2.26"/>
+<affects prod="httpd" version="2.2.25"/>
+<affects prod="httpd" version="2.2.24"/>
+<affects prod="httpd" version="2.2.23"/>
+<affects prod="httpd" version="2.2.22"/>
+<affects prod="httpd" version="2.2.21"/>
+<affects prod="httpd" version="2.2.20"/>
+<affects prod="httpd" version="2.2.19"/>
+<affects prod="httpd" version="2.2.18"/>
+<affects prod="httpd" version="2.2.17"/>
+<affects prod="httpd" version="2.2.16"/>
+<affects prod="httpd" version="2.2.15"/>
+<affects prod="httpd" version="2.2.14"/>
+<affects prod="httpd" version="2.2.13"/>
+<affects prod="httpd" version="2.2.12"/>
+<affects prod="httpd" version="2.2.11"/>
+<affects prod="httpd" version="2.2.10"/>
+<affects prod="httpd" version="2.2.9"/>
+<affects prod="httpd" version="2.2.8"/>
+<affects prod="httpd" version="2.2.6"/>
+<affects prod="httpd" version="2.2.5"/>
+<affects prod="httpd" version="2.2.4"/>
+<affects prod="httpd" version="2.2.3"/>
+<affects prod="httpd" version="2.2.2"/>
+<affects prod="httpd" version="2.2.0"/>
+<acknowledgements>
+This issue was reported by Régis Leroy.
+</acknowledgements>
+</issue>
+
 <issue fixed="2.4.16" reported="20130805" public="20150609" released="20150715">
 <cve name="CVE-2015-3185"/>
 <severity level="4">low</severity>

Modified: websites/staging/httpd/trunk/content/security/vulnerabilities_22.html
==============================================================================
--- websites/staging/httpd/trunk/content/security/vulnerabilities_22.html (original)
+++ websites/staging/httpd/trunk/content/security/vulnerabilities_22.html Tue Jul 28 23:27:40 2015
@@ -94,7 +94,37 @@ in a "-dev" release then this means that
 the development source tree and will be part of an upcoming full release.</p><p> This page is created from a database of vulnerabilities originally
 populated by Apache Week.  Please send comments or corrections for
 these vulnerabilities to the <a href="/security_report.html">Security
-Team</a>.  </p><h1 id="2.2.29">
+Team</a>.  </p><h1 id="2.2.31">
+Fixed in Apache httpd 2.2.31</h1><dl>
+  <dd>
+    <b>low: </b>
+    <b>
+      <name name="CVE-2015-3183">HTTP request smuggling attack against chunked request parser</name>
+    </b>
+    <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3183">CVE-2015-3183</a>
+    <p>
+
+  An HTTP request smuggling attack was possible due to a bug in parsing of
+  chunked requests.  A malicious client could force the server to
+  misinterpret the request length, allowing cache poisoning or
+  credential hijacking if an intermediary proxy is in use.
+  
+</p>
+  </dd>
+  <dd>
+    <p>Acknowledgements: 
+This issue was reported by Régis Leroy.
+</p>
+  </dd>
+  <dd>
+  Reported to security team: 4th April 2015<br/>
+  Issue public: 9th June 2015<br/></dd>
+  <dd>
+  Update Released: 16th July 2015<br/></dd>
+  <dd>
+      Affects: 
+    2.2.29, 2.2.27, 2.2.26, 2.2.25, 2.2.24, 2.2.23, 2.2.22, 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0<p/></dd>
+</dl><h1 id="2.2.29">
 Fixed in Apache httpd 2.2.29</h1><dl>
   <dd>
     <b>important: </b>