SUSE Security Update: Security update for apache2
______________________________________________________________________________

Announcement ID:    SUSE-SU-2020:2311-1
Rating:             moderate
References:         #1174052 #1175070 #1175071 #1175074 
Cross-References:   CVE-2020-11984 CVE-2020-11993 CVE-2020-9490
                   
Affected Products:
                    SUSE Linux Enterprise Module for Server Applications 15-SP2
                    SUSE Linux Enterprise Module for Basesystem 15-SP2
______________________________________________________________________________

   An update that solves three vulnerabilities and has one
   errata is now available.

Description:

   This update for apache2 fixes the following issues:

   - CVE-2020-9490: Fixed a crash caused by a specially crafted value for the
     'Cache-Digest' header in a HTTP/2 request (bsc#1175071).
   - CVE-2020-11984: Fixed an information disclosure bug in mod_proxy_uwsgi
     (bsc#1175074).
   - CVE-2020-11993: When trace/debug was enabled for the HTTP/2 module
     logging statements were made on the wrong connection (bsc#1175070).

   - Solve a crash in mod_proxy_uwsgi for empty values of environment
     variables. (bsc#1174052)


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Module for Server Applications 15-SP2:

      zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP2-2020-2311=1

   - SUSE Linux Enterprise Module for Basesystem 15-SP2:

      zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP2-2020-2311=1



Package List:

   - SUSE Linux Enterprise Module for Server Applications 15-SP2 (aarch64 ppc64le s390x x86_64):

      apache2-debuginfo-2.4.43-3.5.1
      apache2-debugsource-2.4.43-3.5.1
      apache2-devel-2.4.43-3.5.1
      apache2-worker-2.4.43-3.5.1
      apache2-worker-debuginfo-2.4.43-3.5.1

   - SUSE Linux Enterprise Module for Server Applications 15-SP2 (noarch):

      apache2-doc-2.4.43-3.5.1

   - SUSE Linux Enterprise Module for Basesystem 15-SP2 (aarch64 ppc64le s390x x86_64):

      apache2-2.4.43-3.5.1
      apache2-debuginfo-2.4.43-3.5.1
      apache2-debugsource-2.4.43-3.5.1
      apache2-prefork-2.4.43-3.5.1
      apache2-prefork-debuginfo-2.4.43-3.5.1
      apache2-utils-2.4.43-3.5.1
      apache2-utils-debuginfo-2.4.43-3.5.1


References:

   https://www.suse.com/security/cve/CVE-2020-11984.html
   https://www.suse.com/security/cve/CVE-2020-11993.html
   https://www.suse.com/security/cve/CVE-2020-9490.html
   https://bugzilla.suse.com/1174052
   https://bugzilla.suse.com/1175070
   https://bugzilla.suse.com/1175071
   https://bugzilla.suse.com/1175074

_______________________________________________
sle-security-updates mailing list
sle-security-updates@lists.suse.com
http://lists.suse.com/mailman/listinfo/sle-security-updates

SUSE: 2020:2311-1 moderate: apache2

August 25, 2020
An update that solves three vulnerabilities and has one errata is now available

Summary

This update for apache2 fixes the following issues: - CVE-2020-9490: Fixed a crash caused by a specially crafted value for the 'Cache-Digest' header in a HTTP/2 request (bsc#1175071). - CVE-2020-11984: Fixed an information disclosure bug in mod_proxy_uwsgi (bsc#1175074). - CVE-2020-11993: When trace/debug was enabled for the HTTP/2 module logging statements were made on the wrong connection (bsc#1175070). - Solve a crash in mod_proxy_uwsgi for empty values of environment variables. (bsc#1174052) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Module for Server Applications 15-SP2: zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP2-2020-2311=1 - SUSE Linux Enterprise Module for Basesystem 15-SP2: zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP2-2020-2311=1 Package List: - SUSE Linux Enterprise Module for Server Applications 15-SP2 (aarch64 ppc64le s390x x86_64): apache2-debuginfo-2.4.43-3.5.1 apache2-debugsource-2.4.43-3.5.1 apache2-devel-2.4.43-3.5.1 apache2-worker-2.4.43-3.5.1 apache2-worker-debuginfo-2.4.43-3.5.1 - SUSE Linux Enterprise Module for Server Applications 15-SP2 (noarch): apache2-doc-2.4.43-3.5.1 - SUSE Linux Enterprise Module for Basesystem 15-SP2 (aarch64 ppc64le s390x x86_64): apache2-2.4.43-3.5.1 apache2-debuginfo-2.4.43-3.5.1 apache2-debugsource-2.4.43-3.5.1 apache2-prefork-2.4.43-3.5.1 apache2-prefork-debuginfo-2.4.43-3.5.1 apache2-utils-2.4.43-3.5.1 apache2-utils-debuginfo-2.4.43-3.5.1

References

#1174052 #1175070 #1175071 #1175074

Cross- CVE-2020-11984 CVE-2020-11993 CVE-2020-9490

Affected Products:

SUSE Linux Enterprise Module for Server Applications 15-SP2

SUSE Linux Enterprise Module for Basesystem 15-SP2

https://www.suse.com/security/cve/CVE-2020-11984.html

https://www.suse.com/security/cve/CVE-2020-11993.html

https://www.suse.com/security/cve/CVE-2020-9490.html

https://bugzilla.suse.com/1174052

https://bugzilla.suse.com/1175070

https://bugzilla.suse.com/1175071

https://bugzilla.suse.com/1175074

Severity
Announcement ID: SUSE-SU-2020:2311-1
Rating: moderate

Related News