SUSE Security Update: Security update for Apache2
______________________________________________________________________________

Announcement ID:    SUSE-SU-2012:0284-1
Rating:             important
References:         #728876 #738067 #738855 #739783 #741243 #741874 
                    #743743 
Cross-References:   CVE-2007-6750 CVE-2012-0031 CVE-2012-0053
                   
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 11 SP1
                    SUSE Linux Enterprise Server 11 SP1 for VMware
                    SUSE Linux Enterprise Server 11 SP1
______________________________________________________________________________

   An update that solves three vulnerabilities and has four
   fixes is now available. It includes one version update.

Description:


   This update of apache2 and libapr1 fixes regressions and
   several security  problems.

   * CVE-2012-0031: Fixed a scoreboard corruption (shared
   mem segment) by child causes crash of privileged parent
   (invalid free()) during shutdown.
   * CVE-2012-0053: Fixed an issue in error responses that
   could expose "httpOnly" cookies when no custom
   ErrorDocument is specified for status code 400".
   * CVE-2007-6750: The "mod_reqtimeout" module was
   backported from Apache 2.2.21 to help mitigate the
   "Slowloris" Denial of Service attack.

   You need to enable the "mod_reqtimeout" module in your
   existing apache  configuration to make it effective, e.g.
   in the APACHE_MODULES line in  /etc/sysconfig/apache2. For
   more detailed information, check also the README file.

   Also the following bugs have been fixed:

   * Fixed init script action "check-reload" to avoid
   potential crashes. bnc#728876
   * An overlapping memcpy() was replaced by memmove() to
   make this work with newer glibcs. bnc#738067 bnc#741874
   * libapr1: reset errno to zero to not return previous
   value despite good status of new operation. bnc#739783

   Security Issue references:

   * CVE-2007-6750
   
   * CVE-2012-0031
   
   * CVE-2012-0053
   


Special Instructions and Notes:

   Please reboot the system after installing this update.

Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 11 SP1:

      zypper in -t patch sdksp1-apache2-201202-5760

   - SUSE Linux Enterprise Server 11 SP1 for VMware:

      zypper in -t patch slessp1-apache2-201202-5760

   - SUSE Linux Enterprise Server 11 SP1:

      zypper in -t patch slessp1-apache2-201202-5760

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64 s390x x86_64) [New Version: 2.2.12]:

      apache2-devel-2.2.12-1.30.1
      libapr1-devel-1.3.3-11.18.19.1

   - SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 x86_64) [New Version: 2.2.12]:

      apache2-2.2.12-1.30.1
      apache2-doc-2.2.12-1.30.1
      apache2-example-pages-2.2.12-1.30.1
      apache2-prefork-2.2.12-1.30.1
      apache2-utils-2.2.12-1.30.1
      apache2-worker-2.2.12-1.30.1
      libapr1-1.3.3-11.18.19.1

   - SUSE Linux Enterprise Software Development Kit 11 SP1 (ppc64):

      libapr1-devel-32bit-1.3.3-11.18.19.1

   - SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64) [New Version: 2.2.12]:

      apache2-2.2.12-1.30.1
      apache2-doc-2.2.12-1.30.1
      apache2-example-pages-2.2.12-1.30.1
      apache2-prefork-2.2.12-1.30.1
      apache2-utils-2.2.12-1.30.1
      apache2-worker-2.2.12-1.30.1
      libapr1-1.3.3-11.18.19.1

   - SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64) [New Version: 2.2.12]:

      apache2-2.2.12-1.30.1
      apache2-doc-2.2.12-1.30.1
      apache2-example-pages-2.2.12-1.30.1
      apache2-prefork-2.2.12-1.30.1
      apache2-utils-2.2.12-1.30.1
      apache2-worker-2.2.12-1.30.1
      libapr1-1.3.3-11.18.19.1

   - SUSE Linux Enterprise Server 11 SP1 (ppc64):

      libapr1-32bit-1.3.3-11.18.19.1


References:

   https://www.suse.com/security/cve/CVE-2007-6750.html
   https://www.suse.com/security/cve/CVE-2012-0031.html
   https://www.suse.com/security/cve/CVE-2012-0053.html
   https://bugzilla.novell.com/728876
   https://bugzilla.novell.com/738067
   https://bugzilla.novell.com/738855
   https://bugzilla.novell.com/739783
   https://bugzilla.novell.com/741243
   https://bugzilla.novell.com/741874
   https://bugzilla.novell.com/743743
   https://login.microfocus.com/nidp/app/login

SuSE: 2012:0284-1: important: Apache2

February 18, 2012
An update that solves three vulnerabilities and has four An update that solves three vulnerabilities and has four An update that solves three vulnerabilities and has four fixes is ...

Summary

This update of apache2 and libapr1 fixes regressions and several security problems. * CVE-2012-0031: Fixed a scoreboard corruption (shared mem segment) by child causes crash of privileged parent (invalid free()) during shutdown. * CVE-2012-0053: Fixed an issue in error responses that could expose "httpOnly" cookies when no custom ErrorDocument is specified for status code 400". * CVE-2007-6750: The "mod_reqtimeout" module was backported from Apache 2.2.21 to help mitigate the "Slowloris" Denial of Service attack. You need to enable the "mod_reqtimeout" module in your existing apache configuration to make it effective, e.g. in the APACHE_MODULES line in /etc/sysconfig/apache2. For more detailed information, check also the README file. Also the following bugs have been fixed: * Fixed init script action "check-reload" to avoid potential crashes. bnc#728876 * An overlapping memcpy() was replaced by memmove() to make this work with newer glibcs. bnc#738067 bnc#741874 * libapr1: reset errno to zero to not return previous value despite good status of new operation. bnc#739783 Security Issue references: * CVE-2007-6750 * CVE-2012-0031 * CVE-2012-0053

References

#728876 #738067 #738855 #739783 #741243 #741874

#743743

Cross- CVE-2007-6750 CVE-2012-0031 CVE-2012-0053

Affected Products:

SUSE Linux Enterprise Software Development Kit 11 SP1

SUSE Linux Enterprise Server 11 SP1 for VMware

SUSE Linux Enterprise Server 11 SP1

https://www.suse.com/security/cve/CVE-2007-6750.html

https://www.suse.com/security/cve/CVE-2012-0031.html

https://www.suse.com/security/cve/CVE-2012-0053.html

https://bugzilla.novell.com/728876

https://bugzilla.novell.com/738067

https://bugzilla.novell.com/738855

https://bugzilla.novell.com/739783

https://bugzilla.novell.com/741243

https://bugzilla.novell.com/741874

https://bugzilla.novell.com/743743

https://login.microfocus.com/nidp/app/login

Severity
Announcement ID: SUSE-SU-2012:0284-1
Rating: important

Related News