SUSE-SU-2013:0706-1: moderate: Security update for apache2-mod_security2
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Mon Apr 22 13:04:32 MDT 2013
SUSE Security Update: Security update for apache2-mod_security2
______________________________________________________________________________
Announcement ID: SUSE-SU-2013:0706-1
Rating: moderate
References: #768293 #789393 #811624 #813190
Cross-References: CVE-2012-4528 CVE-2013-1915
Affected Products:
SUSE Linux Enterprise Software Development Kit 11 SP2
______________________________________________________________________________
An update that solves two vulnerabilities and has two fixes
is now available. It includes one version update.
Description:
apache2-mod_security2 has been updated to Version 2.7.1.
(FATE#309433).
It contains a lot of bug and security fixes and also new
features.
* version upgrade to 2.7.1. [fate#309433]
* fix for [bnc#813190] CVE-2013-1915: Vulnerable to XXE
attacks
* fix for [bnc#768293]: multi-part bypass; This minor
security threat is not mediated by the old version, and the
corresponding configuration directives are not present
there.
* new configuration framework private to mod_security2:
/etc/apache2/conf.d/mod_security2.conf loads
/usr/share/apache2-mod_security2/rules/modsecurity_crs_10_se
tup.conf, then /etc/apache2/mod_security2.d/*.conf , as set
up based on advice in /etc/apache2/conf.d/mod_security2.conf
* New from 2.5.6 to 2.7.1 (excerpt, the most important
changes): o GPLv2 replaced by Apache License v2 o rules are
not part of the source tarball any longer, but maintaned
upstream externally, and included in this package. o
documentation was externalized to a wiki. Package contains
the FAQ and the reference manual in html form. o renamed
the term "Encryption" in directives that actually refer to
hashes. See CHANGES file for more details. o byte
conversion issues on s390x when logging fixed. o many small
issues fixed that were discovered by a Coverity scanner o
updated reference manual o wrong time calculation when
logging for some timezones fixed. o replaced time-measuring
mechanism with finer granularity for measured
request/answer phases. (Stopwatch remains for compat.) o
cookie parser memory leak fix o parsing of quoted strings
in multipart Content-Disposition headers fixed.
*
apache2-mod_security2-CVE-2009-5031_CVE-2012-2751.diff: 2
CVE IDs for the same issue that was incompletely fixed in
2009. Fix for improper handling of quotes of request
parameter values in the Content-Disposition field of a
request with a multipart/form-data Content-Type header.
This is CVE-2009-5031 and CVE-2012-2751. [bnc#768293]
Please note that both mod_security2 and mod_unique_id
(which is required by mod_security2) modules need to be
enabled at the same time. [bnc#811624]
Security Issue references:
* CVE-2012-4528
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4528
>
* CVE-2013-1915
<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1915
>
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11 SP2:
zypper in -t patch sdksp2-apache2-mod_security2-7606
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 2.7.1]:
apache2-mod_security2-2.7.1-0.2.12.1
References:
http://support.novell.com/security/cve/CVE-2012-4528.html
http://support.novell.com/security/cve/CVE-2013-1915.html
https://bugzilla.novell.com/768293
https://bugzilla.novell.com/789393
https://bugzilla.novell.com/811624
https://bugzilla.novell.com/813190
http://download.novell.com/patch/finder/?keywords=e34478a88c1cc9a22674b27f59b84c88
More information about the sle-security-updates
mailing list