SUSE-SU-2015:0689-1: moderate: Security update for apache2

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Wed Apr 8 17:04:54 MDT 2015


   SUSE Security Update: Security update for apache2
______________________________________________________________________________

Announcement ID:    SUSE-SU-2015:0689-1
Rating:             moderate
References:         #713970 #871310 #899836 #904427 #907339 #907477 
                    
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 11 SP3
                    SUSE Linux Enterprise Server 11 SP3 for VMware
                    SUSE Linux Enterprise Server 11 SP3
______________________________________________________________________________

   An update that contains security fixes can now be installed.

Description:


   The Apache2 webserver was updated to fix various issues.

   The following feature was added:

       * Provide support for the tunneling of web socket connections to a
         backend websockets server. (FATE#316880)

   The following security issues have been fixed:

       * CVE-2013-5704: The mod_headers module in the Apache HTTP Server
         2.2.22 allowed remote attackers to bypass "RequestHeader unset"
         directives by placing a header in the trailer portion of data sent
         with chunked transfer coding. The fix also adds a "MergeTrailers"
         directive to restore legacy behavior.
       * CVE-2014-3581: The cache_merge_headers_out function in
         modules/cache/cache_util.c in the mod_cache module in the Apache
         HTTP Server allowed remote attackers to cause a denial of service
         (NULL pointer dereference and application crash) via an empty HTTP
         Content-Type header.
       * CVE-2003-1418: Apache HTTP Server allowed remote attackers to obtain
         sensitive information via (1) the ETag header, which reveals the
         inode number, or (2) multipart MIME boundary, which reveals child
         process IDs (PID). We so far assumed that this not useful to
         attackers, the fix is basically just reducing potential information
         leaks.

   The following bugs have been fixed:

       * Treat the "server unavailable" condition as a transient error with
         all LDAP SDKs. (bsc#904427)
       * Fixed a segmentation fault at startup if the certs are shared across
         > 1 server_rec. (bsc#907339)


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 11 SP3:

      zypper in -t patch sdksp3-apache2=10533

   - SUSE Linux Enterprise Server 11 SP3 for VMware:

      zypper in -t patch slessp3-apache2=10533

   - SUSE Linux Enterprise Server 11 SP3:

      zypper in -t patch slessp3-apache2=10533

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64):

      apache2-devel-2.2.12-1.51.52.1

   - SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 x86_64):

      apache2-2.2.12-1.51.52.1
      apache2-doc-2.2.12-1.51.52.1
      apache2-example-pages-2.2.12-1.51.52.1
      apache2-prefork-2.2.12-1.51.52.1
      apache2-utils-2.2.12-1.51.52.1
      apache2-worker-2.2.12-1.51.52.1

   - SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64):

      apache2-2.2.12-1.51.52.1
      apache2-doc-2.2.12-1.51.52.1
      apache2-example-pages-2.2.12-1.51.52.1
      apache2-prefork-2.2.12-1.51.52.1
      apache2-utils-2.2.12-1.51.52.1
      apache2-worker-2.2.12-1.51.52.1

   - SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64):

      apache2-2.2.12-1.51.52.1
      apache2-doc-2.2.12-1.51.52.1
      apache2-example-pages-2.2.12-1.51.52.1
      apache2-prefork-2.2.12-1.51.52.1
      apache2-utils-2.2.12-1.51.52.1
      apache2-worker-2.2.12-1.51.52.1


References:

   https://bugzilla.suse.com/713970
   https://bugzilla.suse.com/871310
   https://bugzilla.suse.com/899836
   https://bugzilla.suse.com/904427
   https://bugzilla.suse.com/907339
   https://bugzilla.suse.com/907477
   https://download.suse.com/patch/finder/?keywords=aed66cdca5146f7cf6159ba1f3cd8dba



More information about the sle-security-updates mailing list