Errata overview
Errata ID 140
Date 2016-04-06
Source package apache2
Fixed in version 2.2.22-13.95.201603212007
Description
The following issues have been fixed in apache2:
 * HTTP request smuggling attack against chunked request parser, allowing
   cache poisoning or credential hijacking if an intermediary proxy is in
   use (CVE-2015-3183)
 * Don't limit default DH parameters to 1024 bits. This may cause problems
   with some Java based clients. A work-around is to configure these client
   not to use DHE key exchange but use ECDHE or RSA instead. A server-side
   work-around that limits the DH parameters to 1024 bits for all clients is
   described at http://httpd.apache.org/docs/trunk/ssl/ssl_faq.html#javadh
 * Backport support for adding DH parameters to the SSLCertificateFile
   Custom DH parameters and an EC curve name for ephemeral keys,
   can be added to end of the first file configured using the
   SSLCertificateFile. Such parameters can be generated using the commands
   openssl dhparam and openssl ecparam. The parameters can be added as-is
   to the end of the first certificate file. Only the first file can be used
   for custom parameters, as they are applied independently of the
   authentication algorithm type. The package apache-doc provides more
   information about mod_ssl.
Additional notes
CVE ID CVE-2015-3183
UCS Bug number #40929