SUSE: 2022:0928-1 important: apache2 | LinuxSecurity.com

   SUSE Security Update: Security update for apache2
______________________________________________________________________________

Announcement ID:    SUSE-SU-2022:0928-1
Rating:             important
References:         #1196249 #1197091 #1197095 #1197096 #1197098 
                    #1197177 #1197301 
Cross-References:   CVE-2022-22719 CVE-2022-22720 CVE-2022-22721
                    CVE-2022-23943
CVSS scores:
                    CVE-2022-22719 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-22719 (SUSE): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
                    CVE-2022-22720 (NVD) : 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-22720 (SUSE): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
                    CVE-2022-22721 (NVD) : 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-22721 (SUSE): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H
                    CVE-2022-23943 (NVD) : 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-23943 (SUSE): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H

Affected Products:
                    SUSE Linux Enterprise Server 12-SP5
                    SUSE Linux Enterprise Server for SAP Applications 12-SP5
                    SUSE Linux Enterprise Software Development Kit 12-SP5
______________________________________________________________________________

   An update that solves four vulnerabilities and has three
   fixes is now available.

Description:

   This update for apache2 fixes the following issues:

   - CVE-2022-23943: heap out-of-bounds write in mod_sed (bsc#1197098).
   - CVE-2022-22720: HTTP request smuggling due to incorrect error handling
     (bsc#1197095).
   - CVE-2022-22719: use of uninitialized value of in r:parsebody in mod_lua
     (bsc#1197091).
   - CVE-2022-22721: possible buffer overflow with very large or unlimited
     LimitXMLRequestBody (bsc#1197096).

   Also TLS 1.3 support and openssl 1.1.1 usage was disabled again as it
   caused regressions in various usage scenarios due to the combination
   between openssl 1.0.2 and 1.1.1 linkage without correct symbol versions by
   other libraries / tools. (bsc#1197301 bsc#1197177 bsc#1196249)


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 12-SP5:

      zypper in -t patch SUSE-SLE-SDK-12-SP5-2022-928=1

   - SUSE Linux Enterprise Server 12-SP5:

      zypper in -t patch SUSE-SLE-SERVER-12-SP5-2022-928=1



Package List:

   - SUSE Linux Enterprise Software Development Kit 12-SP5 (aarch64 ppc64le s390x x86_64):

      apache2-debuginfo-2.4.51-35.13.1
      apache2-debugsource-2.4.51-35.13.1
      apache2-devel-2.4.51-35.13.1

   - SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64):

      apache2-2.4.51-35.13.1
      apache2-debuginfo-2.4.51-35.13.1
      apache2-debugsource-2.4.51-35.13.1
      apache2-example-pages-2.4.51-35.13.1
      apache2-prefork-2.4.51-35.13.1
      apache2-prefork-debuginfo-2.4.51-35.13.1
      apache2-utils-2.4.51-35.13.1
      apache2-utils-debuginfo-2.4.51-35.13.1
      apache2-worker-2.4.51-35.13.1
      apache2-worker-debuginfo-2.4.51-35.13.1

   - SUSE Linux Enterprise Server 12-SP5 (noarch):

      apache2-doc-2.4.51-35.13.1


References:

   https://www.suse.com/security/cve/CVE-2022-22719.html
   https://www.suse.com/security/cve/CVE-2022-22720.html
   https://www.suse.com/security/cve/CVE-2022-22721.html
   https://www.suse.com/security/cve/CVE-2022-23943.html
   https://bugzilla.suse.com/1196249
   https://bugzilla.suse.com/1197091
   https://bugzilla.suse.com/1197095
   https://bugzilla.suse.com/1197096
   https://bugzilla.suse.com/1197098
   https://bugzilla.suse.com/1197177
   https://bugzilla.suse.com/1197301

SUSE: 2022:0928-1 important: apache2

March 21, 2022
An update that solves four vulnerabilities and has three fixes is now available

Summary

This update for apache2 fixes the following issues: - CVE-2022-23943: heap out-of-bounds write in mod_sed (bsc#1197098). - CVE-2022-22720: HTTP request smuggling due to incorrect error handling (bsc#1197095). - CVE-2022-22719: use of uninitialized value of in r:parsebody in mod_lua (bsc#1197091). - CVE-2022-22721: possible buffer overflow with very large or unlimited LimitXMLRequestBody (bsc#1197096). Also TLS 1.3 support and openssl 1.1.1 usage was disabled again as it caused regressions in various usage scenarios due to the combination between openssl 1.0.2 and 1.1.1 linkage without correct symbol versions by other libraries / tools. (bsc#1197301 bsc#1197177 bsc#1196249) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12-SP5: zypper in -t patch SUSE-SLE-SDK-12-SP5-2022-928=1 - SUSE Linux Enterprise Server 12-SP5: zypper in -t patch SUSE-SLE-SERVER-12-SP5-2022-928=1 Package List: - SUSE Linux Enterprise Software Development Kit 12-SP5 (aarch64 ppc64le s390x x86_64): apache2-debuginfo-2.4.51-35.13.1 apache2-debugsource-2.4.51-35.13.1 apache2-devel-2.4.51-35.13.1 - SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64): apache2-2.4.51-35.13.1 apache2-debuginfo-2.4.51-35.13.1 apache2-debugsource-2.4.51-35.13.1 apache2-example-pages-2.4.51-35.13.1 apache2-prefork-2.4.51-35.13.1 apache2-prefork-debuginfo-2.4.51-35.13.1 apache2-utils-2.4.51-35.13.1 apache2-utils-debuginfo-2.4.51-35.13.1 apache2-worker-2.4.51-35.13.1 apache2-worker-debuginfo-2.4.51-35.13.1 - SUSE Linux Enterprise Server 12-SP5 (noarch): apache2-doc-2.4.51-35.13.1

References

#1196249 #1197091 #1197095 #1197096 #1197098

#1197177 #1197301

Cross- CVE-2022-22719 CVE-2022-22720 CVE-2022-22721

CVE-2022-23943

CVSS scores:

CVE-2022-22719 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2022-22719 (SUSE): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2022-22720 (NVD) : 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE-2022-22720 (SUSE): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

CVE-2022-22721 (NVD) : 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE-2022-22721 (SUSE): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H

CVE-2022-23943 (NVD) : 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE-2022-23943 (SUSE): 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H

Affected Products:

SUSE Linux Enterprise Server 12-SP5

SUSE Linux Enterprise Server for SAP Applications 12-SP5

SUSE Linux Enterprise Software Development Kit 12-SP5

https://www.suse.com/security/cve/CVE-2022-22719.html

https://www.suse.com/security/cve/CVE-2022-22720.html

https://www.suse.com/security/cve/CVE-2022-22721.html

https://www.suse.com/security/cve/CVE-2022-23943.html

https://bugzilla.suse.com/1196249

https://bugzilla.suse.com/1197091

https://bugzilla.suse.com/1197095

https://bugzilla.suse.com/1197096

https://bugzilla.suse.com/1197098

https://bugzilla.suse.com/1197177

https://bugzilla.suse.com/1197301

Severity
Announcement ID: SUSE-SU-2022:0928-1
Rating: important

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.