SUSE-SU-2015:1851-1: moderate: Security update for apache2

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Fri Oct 30 10:10:24 MDT 2015


   SUSE Security Update: Security update for apache2
______________________________________________________________________________

Announcement ID:    SUSE-SU-2015:1851-1
Rating:             moderate
References:         #444878 #869790 #911159 #915666 #927845 #930228 
                    #931002 #931723 #938723 #938728 #939516 #949766 
                    #949771 
Cross-References:   CVE-2014-8111 CVE-2015-3183 CVE-2015-3185
                    CVE-2015-4000
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 12
                    SUSE Linux Enterprise Server 12
                    SUSE Enterprise Storage 1.0
______________________________________________________________________________

   An update that solves four vulnerabilities and has 9 fixes
   is now available.

Description:


   The Apache2 webserver was updated to fix several issues:

   Security issues fixed:
   - The chunked transfer coding implementation in the Apache HTTP Server did
     not properly parse chunk headers, which allowed remote attackers to
     conduct HTTP request smuggling attacks via a crafted request, related to
     mishandling of large chunk-size values and invalid chunk-extension
     characters in modules/http/http_filters.c. [bsc#938728, CVE-2015-3183]
   - The LOGJAM security issue was addressed by: [bnc#931723 CVE-2015-4000]
     * changing the SSLCipherSuite cipherstring to disable export cipher
       suites and deploy Ephemeral Elliptic-Curve Diffie-Hellman (ECDHE)
       ciphers.
     * Adjust 'gensslcert' script to generate a strong and unique Diffie
       Hellman Group and append it to the server certificate file.
   - The ap_some_auth_required function in server/request.c in the Apache
     HTTP Server 2.4.x did not consider that a Require directive may be
     associated with an authorization setting rather than an authentication
     setting, which allowed remote attackers to bypass intended access
     restrictions in opportunistic circumstances by leveraging the presence
     of a module that relies on the 2.2 API behavior. [bnc#938723 bnc#939516
      CVE-2015-3185]
   - Tomcat mod_jk information leak due to incorrect JkMount/JkUnmount
     directives processing [bnc#927845 CVE-2014-8111]

   Other bugs fixed:
   - Now provides a suse_maintenance_mmn_# [bnc#915666].
   - Hardcoded modules in the %files [bnc#444878].
   - Fixed the IfModule directive around SSLSessionCache [bnc#911159].
   - allow only TCP ports in Yast2 firewall files [bnc#931002]
   - fixed a regression when some LDAP searches or comparisons might be done
     with the wrong credentials when a backend connection is reused
     [bnc#930228]
   - Fixed split-logfile2 script [bnc#869790]
   - remove the changed MODULE_MAGIC_NUMBER_MINOR from which confuses modules
     the way that they expect functionality that our apache does not provide
     [bnc#915666]
   - gensslcert: CN now defaults to `hostname -f` [bnc#949766], fix help
     [bnc#949771]


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 12:

      zypper in -t patch SUSE-SLE-SDK-12-2015-772=1

   - SUSE Linux Enterprise Server 12:

      zypper in -t patch SUSE-SLE-SERVER-12-2015-772=1

   - SUSE Enterprise Storage 1.0:

      zypper in -t patch SUSE-Storage-1.0-2015-772=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Software Development Kit 12 (ppc64le s390x x86_64):

      apache2-debuginfo-2.4.10-14.10.1
      apache2-debugsource-2.4.10-14.10.1
      apache2-devel-2.4.10-14.10.1

   - SUSE Linux Enterprise Server 12 (ppc64le s390x x86_64):

      apache2-2.4.10-14.10.1
      apache2-debuginfo-2.4.10-14.10.1
      apache2-debugsource-2.4.10-14.10.1
      apache2-example-pages-2.4.10-14.10.1
      apache2-mod_auth_kerb-5.4-2.4.1
      apache2-mod_auth_kerb-debuginfo-5.4-2.4.1
      apache2-mod_auth_kerb-debugsource-5.4-2.4.1
      apache2-mod_jk-1.2.40-2.6.1
      apache2-mod_jk-debuginfo-1.2.40-2.6.1
      apache2-mod_jk-debugsource-1.2.40-2.6.1
      apache2-mod_security2-2.8.0-3.4.1
      apache2-mod_security2-debuginfo-2.8.0-3.4.1
      apache2-mod_security2-debugsource-2.8.0-3.4.1
      apache2-prefork-2.4.10-14.10.1
      apache2-prefork-debuginfo-2.4.10-14.10.1
      apache2-utils-2.4.10-14.10.1
      apache2-utils-debuginfo-2.4.10-14.10.1
      apache2-worker-2.4.10-14.10.1
      apache2-worker-debuginfo-2.4.10-14.10.1

   - SUSE Linux Enterprise Server 12 (noarch):

      apache2-doc-2.4.10-14.10.1

   - SUSE Enterprise Storage 1.0 (x86_64):

      apache2-mod_fastcgi-2.4.7-3.4.1
      apache2-mod_fastcgi-debuginfo-2.4.7-3.4.1
      apache2-mod_fastcgi-debugsource-2.4.7-3.4.1


References:

   https://www.suse.com/security/cve/CVE-2014-8111.html
   https://www.suse.com/security/cve/CVE-2015-3183.html
   https://www.suse.com/security/cve/CVE-2015-3185.html
   https://www.suse.com/security/cve/CVE-2015-4000.html
   https://bugzilla.suse.com/444878
   https://bugzilla.suse.com/869790
   https://bugzilla.suse.com/911159
   https://bugzilla.suse.com/915666
   https://bugzilla.suse.com/927845
   https://bugzilla.suse.com/930228
   https://bugzilla.suse.com/931002
   https://bugzilla.suse.com/931723
   https://bugzilla.suse.com/938723
   https://bugzilla.suse.com/938728
   https://bugzilla.suse.com/939516
   https://bugzilla.suse.com/949766
   https://bugzilla.suse.com/949771



More information about the sle-security-updates mailing list