{"id":"USN-2686-1","summary":"apache2 vulnerabilities","details":"It was discovered that the Apache HTTP Server incorrectly parsed chunk\nheaders. A remote attacker could possibly use this issue to perform HTTP\nrequest smuggling attacks. (CVE-2015-3183)\n\nIt was discovered that the Apache HTTP Server incorrectly handled the\nap_some_auth_required API. A remote attacker could possibly use this issue\nto bypass intended access restrictions. This issue only affected Ubuntu\n14.04 LTS and Ubuntu 15.04. (CVE-2015-3185)\n","modified":"2026-04-22T09:13:52.264244Z","published":"2015-07-27T17:47:11Z","related":["UBUNTU-CVE-2015-3183","UBUNTU-CVE-2015-3185"],"upstream":["CVE-2015-3183","CVE-2015-3185","UBUNTU-CVE-2015-3183","UBUNTU-CVE-2015-3185"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2686-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-3183"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2015-3185"}],"affected":[{"package":{"name":"apache2","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/apache2@2.4.7-1ubuntu4.5?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.4.7-1ubuntu4.5"}]}],"versions":["2.4.6-2ubuntu2","2.4.6-2ubuntu3","2.4.6-2ubuntu4","2.4.7-1ubuntu1","2.4.7-1ubuntu2","2.4.7-1ubuntu3","2.4.7-1ubuntu4","2.4.7-1ubuntu4.1","2.4.7-1ubuntu4.4"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"2.4.7-1ubuntu4.5","binary_name":"apache2"},{"binary_version":"2.4.7-1ubuntu4.5","binary_name":"apache2-bin"},{"binary_version":"2.4.7-1ubuntu4.5","binary_name":"apache2-data"},{"binary_version":"2.4.7-1ubuntu4.5","binary_name":"apache2-mpm-event"},{"binary_version":"2.4.7-1ubuntu4.5","binary_name":"apache2-mpm-itk"},{"binary_version":"2.4.7-1ubuntu4.5","binary_name":"apache2-mpm-prefork"},{"binary_version":"2.4.7-1ubuntu4.5","binary_name":"apache2-mpm-worker"},{"binary_version":"2.4.7-1ubuntu4.5","binary_name":"apache2-suexec"},{"binary_version":"2.4.7-1ubuntu4.5","binary_name":"apache2-suexec-custom"},{"binary_version":"2.4.7-1ubuntu4.5","binary_name":"apache2-suexec-pristine"},{"binary_version":"2.4.7-1ubuntu4.5","binary_name":"apache2-utils"},{"binary_version":"2.4.7-1ubuntu4.5","binary_name":"apache2.2-bin"},{"binary_version":"1:2.4.7-1ubuntu4.5","binary_name":"libapache2-mod-macro"},{"binary_version":"1:2.4.7-1ubuntu4.5","binary_name":"libapache2-mod-proxy-html"}]},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2015-3183","severity":[{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2015-3185","severity":[{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:14.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2686-1.json"}}],"schema_version":"1.7.5"}