Security update for Apache2

SUSE Security Update: Security update for Apache2
Announcement ID: SUSE-SU-2012:0284-1
Rating: important
References: #728876 #738067 #738855 #739783 #741243 #741874 #743743
Affected Products:
  • SUSE Linux Enterprise Software Development Kit 11 SP1
  • SUSE Linux Enterprise Server 11 SP1 for VMware
  • SUSE Linux Enterprise Server 11 SP1

  • An update that solves three vulnerabilities and has four fixes is now available. It includes one version update.

    Description:


    This update of apache2 and libapr1 fixes regressions and
    several security problems.

    * CVE-2012-0031: Fixed a scoreboard corruption (shared
    mem segment) by child causes crash of privileged parent
    (invalid free()) during shutdown.
    * CVE-2012-0053: Fixed an issue in error responses that
    could expose "httpOnly" cookies when no custom
    ErrorDocument is specified for status code 400".
    * CVE-2007-6750: The "mod_reqtimeout" module was
    backported from Apache 2.2.21 to help mitigate the
    "Slowloris" Denial of Service attack.

    You need to enable the "mod_reqtimeout" module in your
    existing apache configuration to make it effective, e.g.
    in the APACHE_MODULES line in /etc/sysconfig/apache2. For
    more detailed information, check also the README file.

    Also the following bugs have been fixed:

    * Fixed init script action "check-reload" to avoid
    potential crashes. bnc#728876
    * An overlapping memcpy() was replaced by memmove() to
    make this work with newer glibcs. bnc#738067 bnc#741874
    * libapr1: reset errno to zero to not return previous
    value despite good status of new operation. bnc#739783

    Security Issue references:

    * CVE-2007-6750
    >
    * CVE-2012-0031
    >
    * CVE-2012-0053
    >

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Linux Enterprise Software Development Kit 11 SP1:
      zypper in -t patch sdksp1-apache2-201202-5760
    • SUSE Linux Enterprise Server 11 SP1 for VMware:
      zypper in -t patch slessp1-apache2-201202-5760
    • SUSE Linux Enterprise Server 11 SP1:
      zypper in -t patch slessp1-apache2-201202-5760

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 ia64 ppc64 s390x x86_64) [New Version: 2.2.12]:
    • apache2-devel-2.2.12-1.30.1
    • libapr1-devel-1.3.3-11.18.19.1
    • SUSE Linux Enterprise Software Development Kit 11 SP1 (i586 x86_64) [New Version: 2.2.12]:
    • apache2-2.2.12-1.30.1
    • apache2-doc-2.2.12-1.30.1
    • apache2-example-pages-2.2.12-1.30.1
    • apache2-prefork-2.2.12-1.30.1
    • apache2-utils-2.2.12-1.30.1
    • apache2-worker-2.2.12-1.30.1
    • libapr1-1.3.3-11.18.19.1
    • SUSE Linux Enterprise Software Development Kit 11 SP1 (ppc64):
    • libapr1-devel-32bit-1.3.3-11.18.19.1
    • SUSE Linux Enterprise Server 11 SP1 for VMware (i586 x86_64) [New Version: 2.2.12]:
    • apache2-2.2.12-1.30.1
    • apache2-doc-2.2.12-1.30.1
    • apache2-example-pages-2.2.12-1.30.1
    • apache2-prefork-2.2.12-1.30.1
    • apache2-utils-2.2.12-1.30.1
    • apache2-worker-2.2.12-1.30.1
    • libapr1-1.3.3-11.18.19.1
    • SUSE Linux Enterprise Server 11 SP1 (i586 ia64 ppc64 s390x x86_64) [New Version: 2.2.12]:
    • apache2-2.2.12-1.30.1
    • apache2-doc-2.2.12-1.30.1
    • apache2-example-pages-2.2.12-1.30.1
    • apache2-prefork-2.2.12-1.30.1
    • apache2-utils-2.2.12-1.30.1
    • apache2-worker-2.2.12-1.30.1
    • libapr1-1.3.3-11.18.19.1
    • SUSE Linux Enterprise Server 11 SP1 (ppc64):
    • libapr1-32bit-1.3.3-11.18.19.1

    References:

    • http://support.novell.com/security/cve/CVE-2007-6750.html
    • http://support.novell.com/security/cve/CVE-2012-0031.html
    • http://support.novell.com/security/cve/CVE-2012-0053.html
    • https://bugzilla.novell.com/728876
    • https://bugzilla.novell.com/738067
    • https://bugzilla.novell.com/738855
    • https://bugzilla.novell.com/739783
    • https://bugzilla.novell.com/741243
    • https://bugzilla.novell.com/741874
    • https://bugzilla.novell.com/743743
    • http://download.suse.com/patch/finder/?keywords=26fd37ffcda352499111cd00df8417e9