Security update for apache2-mod_security2
|References:||#768293 #789393 #811624 #813190|
An update that solves two vulnerabilities and has two fixes is now available. It includes one version update.
apache2-mod_security2 has been updated to Version 2.7.1.
It contains a lot of bug and security fixes and also new
* version upgrade to 2.7.1. [fate#309433]
* fix for [bnc#813190] CVE-2013-1915: Vulnerable to XXE
* fix for [bnc#768293]: multi-part bypass; This minor
security threat is not mediated by the old version, and the
corresponding configuration directives are not present
* new configuration framework private to mod_security2:
tup.conf, then /etc/apache2/mod_security2.d/*.conf , as set
up based on advice in /etc/apache2/conf.d/mod_security2.conf
* New from 2.5.6 to 2.7.1 (excerpt, the most important
changes): o GPLv2 replaced by Apache License v2 o rules are
not part of the source tarball any longer, but maintaned
upstream externally, and included in this package. o
documentation was externalized to a wiki. Package contains
the FAQ and the reference manual in html form. o renamed
the term "Encryption" in directives that actually refer to
hashes. See CHANGES file for more details. o byte
conversion issues on s390x when logging fixed. o many small
issues fixed that were discovered by a Coverity scanner o
updated reference manual o wrong time calculation when
logging for some timezones fixed. o replaced time-measuring
mechanism with finer granularity for measured
request/answer phases. (Stopwatch remains for compat.) o
cookie parser memory leak fix o parsing of quoted strings
in multipart Content-Disposition headers fixed.
CVE IDs for the same issue that was incompletely fixed in
2009. Fix for improper handling of quotes of request
parameter values in the Content-Disposition field of a
request with a multipart/form-data Content-Type header.
This is CVE-2009-5031 and CVE-2012-2751. [bnc#768293]
Please note that both mod_security2 and mod_unique_id
(which is required by mod_security2) modules need to be
enabled at the same time. [bnc#811624]
Security Issue references:
To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Software Development Kit 11 SP2:
zypper in -t patch sdksp2-apache2-mod_security2-7606
To bring your system up-to-date, use "zypper patch".
- SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 2.7.1]: