openSUSE Security Update: security issues addressed, most notably the mod_security heap overflow known as CVE-2014-0226
______________________________________________________________________________

Announcement ID:    openSUSE-SU-2014:0969-1
Rating:             important
References:         #859916 #869105 #869106 #871309 #887765 #887768 
                    
Cross-References:   CVE-2013-5705 CVE-2013-6438 CVE-2014-0098
                    CVE-2014-0226 CVE-2014-0231
Affected Products:
                    openSUSE 11.4
______________________________________________________________________________

   An update that solves 5 vulnerabilities and has one errata
   is now available.

Description:

   apache2:
   - ECC support was added to mod_ssl
   - fix for a race condition in mod_status known as CVE-2014-0226 can lead
     to information disclosure; mod_status is not active by default, and is
     normally only open for connects from localhost.
   - fix for bug known as CVE-2014-0098 that can crash the apache process if
     a specially designed cookie is sent to the server (log_cookie.c)
   - fix for crash bug in mod_dav known as CVE-2013-6438
   - fix for a problem with non-responsive CGI scripts that would otherwise
     cause the server to stall and deny service. CVE-2014-0231, new
     configuration parameter CGIDScriptTimeout defaults to 60s.

   apache2-mod_security2:
   - specially drafted chunked http requests allow an attacker to bypass
     filters configured in mod_security2. This vulnerability is known as
     CVE-2013-5705.


Patch Instructions:

   To install this openSUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - openSUSE 11.4:

      zypper in -t patch 2014-72

   To bring your system up-to-date, use "zypper patch".


Package List:

   - openSUSE 11.4 (i586 x86_64):

      apache2-2.2.17-80.1
      apache2-debuginfo-2.2.17-80.1
      apache2-debugsource-2.2.17-80.1
      apache2-devel-2.2.17-80.1
      apache2-event-2.2.17-80.1
      apache2-event-debuginfo-2.2.17-80.1
      apache2-example-certificates-2.2.17-80.1
      apache2-example-pages-2.2.17-80.1
      apache2-itk-2.2.17-80.1
      apache2-itk-debuginfo-2.2.17-80.1
      apache2-mod_security2-2.7.5-16.1
      apache2-mod_security2-debuginfo-2.7.5-16.1
      apache2-mod_security2-debugsource-2.7.5-16.1
      apache2-prefork-2.2.17-80.1
      apache2-prefork-debuginfo-2.2.17-80.1
      apache2-utils-2.2.17-80.1
      apache2-utils-debuginfo-2.2.17-80.1
      apache2-worker-2.2.17-80.1
      apache2-worker-debuginfo-2.2.17-80.1

   - openSUSE 11.4 (noarch):

      apache2-doc-2.2.17-80.1


References:

   http://support.novell.com/security/cve/CVE-2013-5705.html
   http://support.novell.com/security/cve/CVE-2013-6438.html
   http://support.novell.com/security/cve/CVE-2014-0098.html
   http://support.novell.com/security/cve/CVE-2014-0226.html
   http://support.novell.com/security/cve/CVE-2014-0231.html
   https://bugzilla.novell.com/859916
   https://bugzilla.novell.com/869105
   https://bugzilla.novell.com/869106
   https://bugzilla.novell.com/871309
   https://bugzilla.novell.com/887765
   https://bugzilla.novell.com/887768

openSUSE: 2014:0969-1: important: security issues addressed, most notably the mod_security heap overflow known as CVE-2014-0226

August 7, 2014
An update that solves 5 vulnerabilities and has one errata An update that solves 5 vulnerabilities and has one errata An update that solves 5 vulnerabilities and has one errata is ...

Description

apache2: - ECC support was added to mod_ssl - fix for a race condition in mod_status known as CVE-2014-0226 can lead to information disclosure; mod_status is not active by default, and is normally only open for connects from localhost. - fix for bug known as CVE-2014-0098 that can crash the apache process if a specially designed cookie is sent to the server (log_cookie.c) - fix for crash bug in mod_dav known as CVE-2013-6438 - fix for a problem with non-responsive CGI scripts that would otherwise cause the server to stall and deny service. CVE-2014-0231, new configuration parameter CGIDScriptTimeout defaults to 60s. apache2-mod_security2: - specially drafted chunked http requests allow an attacker to bypass filters configured in mod_security2. This vulnerability is known as CVE-2013-5705.

 

Patch

Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 11.4: zypper in -t patch 2014-72 To bring your system up-to-date, use "zypper patch".


Package List

- openSUSE 11.4 (i586 x86_64): apache2-2.2.17-80.1 apache2-debuginfo-2.2.17-80.1 apache2-debugsource-2.2.17-80.1 apache2-devel-2.2.17-80.1 apache2-event-2.2.17-80.1 apache2-event-debuginfo-2.2.17-80.1 apache2-example-certificates-2.2.17-80.1 apache2-example-pages-2.2.17-80.1 apache2-itk-2.2.17-80.1 apache2-itk-debuginfo-2.2.17-80.1 apache2-mod_security2-2.7.5-16.1 apache2-mod_security2-debuginfo-2.7.5-16.1 apache2-mod_security2-debugsource-2.7.5-16.1 apache2-prefork-2.2.17-80.1 apache2-prefork-debuginfo-2.2.17-80.1 apache2-utils-2.2.17-80.1 apache2-utils-debuginfo-2.2.17-80.1 apache2-worker-2.2.17-80.1 apache2-worker-debuginfo-2.2.17-80.1 - openSUSE 11.4 (noarch): apache2-doc-2.2.17-80.1


References

http://support.novell.com/security/cve/CVE-2013-5705.html http://support.novell.com/security/cve/CVE-2013-6438.html http://support.novell.com/security/cve/CVE-2014-0098.html http://support.novell.com/security/cve/CVE-2014-0226.html http://support.novell.com/security/cve/CVE-2014-0231.html https://bugzilla.novell.com/859916 https://bugzilla.novell.com/869105 https://bugzilla.novell.com/869106 https://bugzilla.novell.com/871309 https://bugzilla.novell.com/887765 https://bugzilla.novell.com/887768


Severity
Announcement ID: openSUSE-SU-2014:0969-1
Rating: important
Affected Products: openSUSE 11.4