SUSE-SU-2013:0706-1: moderate: Security update for apache2-mod_security2

sle-updates at lists.suse.com sle-updates at lists.suse.com
Mon Apr 22 13:04:32 MDT 2013


   SUSE Security Update: Security update for apache2-mod_security2
______________________________________________________________________________

Announcement ID:    SUSE-SU-2013:0706-1
Rating:             moderate
References:         #768293 #789393 #811624 #813190 
Cross-References:   CVE-2012-4528 CVE-2013-1915
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 11 SP2
______________________________________________________________________________

   An update that solves two vulnerabilities and has two fixes
   is now available. It includes one version update.

Description:


   apache2-mod_security2 has been updated to Version 2.7.1.
   (FATE#309433).

   It contains a lot of bug and security fixes and also new
   features.

   * version upgrade to 2.7.1. [fate#309433]
   * fix for [bnc#813190] CVE-2013-1915: Vulnerable to XXE
   attacks
   * fix for [bnc#768293]: multi-part bypass; This minor
   security threat is not mediated by the old version, and the
   corresponding configuration directives are not present
   there.
   * new configuration framework private to mod_security2:
   /etc/apache2/conf.d/mod_security2.conf loads
   /usr/share/apache2-mod_security2/rules/modsecurity_crs_10_se
   tup.conf, then /etc/apache2/mod_security2.d/*.conf , as set
   up based on advice in /etc/apache2/conf.d/mod_security2.conf
   * New from 2.5.6 to 2.7.1 (excerpt, the most important
   changes): o GPLv2 replaced by Apache License v2 o rules are
   not part of the source tarball any longer, but maintaned
   upstream externally, and included in this package. o
   documentation was externalized to a wiki. Package contains
   the FAQ and the reference manual in html form. o renamed
   the term "Encryption" in directives that actually refer to
   hashes. See CHANGES file for more details. o byte
   conversion issues on s390x when logging fixed. o many small
   issues fixed that were discovered by a Coverity scanner o
   updated reference manual o wrong time calculation when
   logging for some timezones fixed. o replaced time-measuring
   mechanism with finer granularity for measured
   request/answer phases. (Stopwatch remains for compat.) o
   cookie parser memory leak fix o parsing of quoted strings
   in multipart Content-Disposition headers fixed.
   *
   apache2-mod_security2-CVE-2009-5031_CVE-2012-2751.diff: 2
   CVE IDs for the same issue that was incompletely fixed in
   2009. Fix for improper handling of quotes of request
   parameter values in the Content-Disposition field of a
   request with a multipart/form-data Content-Type header.
   This is CVE-2009-5031 and CVE-2012-2751. [bnc#768293]

   Please note that both mod_security2 and mod_unique_id
   (which is required by  mod_security2) modules need to be
   enabled at the same time. [bnc#811624]

   Security Issue references:

   * CVE-2012-4528
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4528
   >
   * CVE-2013-1915
   <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1915
   >


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 11 SP2:

      zypper in -t patch sdksp2-apache2-mod_security2-7606

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 2.7.1]:

      apache2-mod_security2-2.7.1-0.2.12.1


References:

   http://support.novell.com/security/cve/CVE-2012-4528.html
   http://support.novell.com/security/cve/CVE-2013-1915.html
   https://bugzilla.novell.com/768293
   https://bugzilla.novell.com/789393
   https://bugzilla.novell.com/811624
   https://bugzilla.novell.com/813190
   http://download.novell.com/patch/finder/?keywords=e34478a88c1cc9a22674b27f59b84c88



More information about the sle-updates mailing list