SUSE-SU-2015:1885-2: moderate: Security update for apache2
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Mon Nov 2 09:12:47 MST 2015
SUSE Security Update: Security update for apache2
______________________________________________________________________________
Announcement ID: SUSE-SU-2015:1885-2
Rating: moderate
References: #444878 #931002 #938728 #941676
Cross-References: CVE-2015-3183
Affected Products:
SUSE Studio Onsite 1.3
SUSE Linux Enterprise Software Development Kit 11-SP4
SUSE Linux Enterprise Software Development Kit 11-SP3
SUSE Linux Enterprise Server for VMWare 11-SP3
SUSE Linux Enterprise Server 11-SP4
SUSE Linux Enterprise Server 11-SP3
SUSE Linux Enterprise Debuginfo 11-SP4
SUSE Linux Enterprise Debuginfo 11-SP3
______________________________________________________________________________
An update that solves one vulnerability and has three fixes
is now available.
Description:
Apache was updated to fix one security vulnerability and two bugs.
Following security issue was fixed.
- Fix the chunked transfer coding implementation in the Apache
(bsc#938728, CVE-2015-3183)
Bugs fixed:
- add SSLSessionTickets directive (bsc#941676)
- hardcode modules %files (bsc#444878)
- only enable the port 443 for TCP protocol, not UDP. (bsc#931002)
Patch Instructions:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Studio Onsite 1.3:
zypper in -t patch slestso13-apache2-12181=1
- SUSE Linux Enterprise Software Development Kit 11-SP4:
zypper in -t patch sdksp4-apache2-12181=1
- SUSE Linux Enterprise Software Development Kit 11-SP3:
zypper in -t patch sdksp3-apache2-12181=1
- SUSE Linux Enterprise Server for VMWare 11-SP3:
zypper in -t patch slessp3-apache2-12181=1
- SUSE Linux Enterprise Server 11-SP4:
zypper in -t patch slessp4-apache2-12181=1
- SUSE Linux Enterprise Server 11-SP3:
zypper in -t patch slessp3-apache2-12181=1
- SUSE Linux Enterprise Debuginfo 11-SP4:
zypper in -t patch dbgsp4-apache2-12181=1
- SUSE Linux Enterprise Debuginfo 11-SP3:
zypper in -t patch dbgsp3-apache2-12181=1
To bring your system up-to-date, use "zypper patch".
Package List:
- SUSE Studio Onsite 1.3 (x86_64):
apache2-devel-2.2.12-59.1
- SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 s390x x86_64):
apache2-devel-2.2.12-59.1
- SUSE Linux Enterprise Software Development Kit 11-SP4 (i586 x86_64):
apache2-2.2.12-59.1
apache2-doc-2.2.12-59.1
apache2-example-pages-2.2.12-59.1
apache2-prefork-2.2.12-59.1
apache2-utils-2.2.12-59.1
apache2-worker-2.2.12-59.1
- SUSE Linux Enterprise Software Development Kit 11-SP3 (i586 s390x x86_64):
apache2-devel-2.2.12-59.1
- SUSE Linux Enterprise Software Development Kit 11-SP3 (i586 x86_64):
apache2-2.2.12-59.1
apache2-doc-2.2.12-59.1
apache2-example-pages-2.2.12-59.1
apache2-prefork-2.2.12-59.1
apache2-utils-2.2.12-59.1
apache2-worker-2.2.12-59.1
- SUSE Linux Enterprise Server for VMWare 11-SP3 (i586 x86_64):
apache2-2.2.12-59.1
apache2-doc-2.2.12-59.1
apache2-example-pages-2.2.12-59.1
apache2-prefork-2.2.12-59.1
apache2-utils-2.2.12-59.1
apache2-worker-2.2.12-59.1
- SUSE Linux Enterprise Server 11-SP4 (i586 s390x x86_64):
apache2-2.2.12-59.1
apache2-doc-2.2.12-59.1
apache2-example-pages-2.2.12-59.1
apache2-prefork-2.2.12-59.1
apache2-utils-2.2.12-59.1
apache2-worker-2.2.12-59.1
- SUSE Linux Enterprise Server 11-SP3 (i586 s390x x86_64):
apache2-2.2.12-59.1
apache2-doc-2.2.12-59.1
apache2-example-pages-2.2.12-59.1
apache2-prefork-2.2.12-59.1
apache2-utils-2.2.12-59.1
apache2-worker-2.2.12-59.1
- SUSE Linux Enterprise Debuginfo 11-SP4 (i586 ia64 ppc64 s390x x86_64):
apache2-debuginfo-2.2.12-59.1
apache2-debugsource-2.2.12-59.1
- SUSE Linux Enterprise Debuginfo 11-SP3 (i586 ia64 ppc64 s390x x86_64):
apache2-debuginfo-2.2.12-59.1
apache2-debugsource-2.2.12-59.1
References:
https://www.suse.com/security/cve/CVE-2015-3183.html
https://bugzilla.suse.com/444878
https://bugzilla.suse.com/931002
https://bugzilla.suse.com/938728
https://bugzilla.suse.com/941676
More information about the sle-security-updates
mailing list