SUSE-SU-2013:0830-1: moderate: Security update for Apache

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Mon May 27 09:04:27 MDT 2013


   SUSE Security Update: Security update for Apache
______________________________________________________________________________

Announcement ID:    SUSE-SU-2013:0830-1
Rating:             moderate
References:         #722545 #757710 #774045 #777260 #782956 #788121 
                    #793004 #798733 #806458 #807152 
Cross-References:   CVE-2012-0021 CVE-2012-0883 CVE-2012-2687
                    CVE-2012-3499 CVE-2012-4557 CVE-2012-4558
                   
Affected Products:
                    SUSE Linux Enterprise Server 11 SP1 for VMware LTSS
                    SUSE Linux Enterprise Server 11 SP1 LTSS
______________________________________________________________________________

   An update that solves 6 vulnerabilities and has four fixes
   is now available. It includes one version update.

Description:


   Apache2 has been updated to fix multiple security issues:

   *

   CVE-2012-4557: Denial of Service via special requests
   in mod_proxy_ajp

   *

   CVE-2012-0883: improper LD_LIBRARY_PATH handling

   *

   CVE-2012-2687: filename escaping problem

   *

   CVE-2012-4558: Multiple cross-site scripting (XSS)
   vulnerabilities in the balancer_handler function in the
   manager interface in mod_proxy_balancer.c in the
   mod_proxy_balancer module in the Apache HTTP Server
   potentially allowed remote attackers to inject arbitrary
   web script or HTML via a crafted string.

   *

   CVE-2012-3499: Multiple cross-site scripting (XSS)
   vulnerabilities in the Apache HTTP Server allowed remote
   attackers to inject arbitrary web script or HTML via
   vectors involving hostnames and URIs in the (1)
   mod_imagemap, (2) mod_info, (3) mod_ldap, (4)
   mod_proxy_ftp, and (5) mod_status modules.

   Additionally, some non-security bugs have been fixed:

   *

   ignore case when checking against SNI server names.
   [bnc#798733]

   *

   httpd-2.2.x-CVE-2011-3368_CVE-2011-4317-bnc722545.diff rewor
   ked to reflect the upstream changes. This will prevent the
   "Invalid URI in request OPTIONS *" messages in the error
   log. [bnc#722545]

   *

   new sysconfig variable
   APACHE_DISABLE_SSL_COMPRESSION; if set to on,
   OPENSSL_NO_DEFAULT_ZLIB will be inherited to the apache
   process; openssl will then transparently disable
   compression. This change affects start script and sysconfig
   fillup template. Default is on, SSL compression disabled.
   Please see mod_deflate for compressed transfer at http
   layer. [bnc#782956]

   Security Issue references:

   * CVE-2012-3499
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3499
   >
   * CVE-2012-4558
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4558
   >
   * CVE-2012-4557
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4557
   >
   * CVE-2012-2687
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2687
   >
   * CVE-2012-0883
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0883
   >
   * CVE-2012-0021
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0021
   >


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server 11 SP1 for VMware LTSS:

      zypper in -t patch slessp1-apache2-7674

   - SUSE Linux Enterprise Server 11 SP1 LTSS:

      zypper in -t patch slessp1-apache2-7674

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Server 11 SP1 for VMware LTSS (i586 x86_64) [New Version: 2.2.12]:

      apache2-2.2.12-1.38.2
      apache2-doc-2.2.12-1.38.2
      apache2-example-pages-2.2.12-1.38.2
      apache2-prefork-2.2.12-1.38.2
      apache2-utils-2.2.12-1.38.2
      apache2-worker-2.2.12-1.38.2

   - SUSE Linux Enterprise Server 11 SP1 LTSS (i586 s390x x86_64) [New Version: 2.2.12]:

      apache2-2.2.12-1.38.2
      apache2-doc-2.2.12-1.38.2
      apache2-example-pages-2.2.12-1.38.2
      apache2-prefork-2.2.12-1.38.2
      apache2-utils-2.2.12-1.38.2
      apache2-worker-2.2.12-1.38.2


References:

   http://support.novell.com/security/cve/CVE-2012-0021.html
   http://support.novell.com/security/cve/CVE-2012-0883.html
   http://support.novell.com/security/cve/CVE-2012-2687.html
   http://support.novell.com/security/cve/CVE-2012-3499.html
   http://support.novell.com/security/cve/CVE-2012-4557.html
   http://support.novell.com/security/cve/CVE-2012-4558.html
   https://bugzilla.novell.com/722545
   https://bugzilla.novell.com/757710
   https://bugzilla.novell.com/774045
   https://bugzilla.novell.com/777260
   https://bugzilla.novell.com/782956
   https://bugzilla.novell.com/788121
   https://bugzilla.novell.com/793004
   https://bugzilla.novell.com/798733
   https://bugzilla.novell.com/806458
   https://bugzilla.novell.com/807152
   http://download.novell.com/patch/finder/?keywords=efd52c274921f5432920f00796e7dbd7



More information about the sle-security-updates mailing list