Security update for apache2-mod_security2

SUSE Security Update: Security update for apache2-mod_security2
Announcement ID: SUSE-SU-2013:0706-1
Rating: moderate
References: #768293 #789393 #811624 #813190
Affected Products:
  • SUSE Linux Enterprise Software Development Kit 11 SP2

  • An update that solves two vulnerabilities and has two fixes is now available. It includes one version update.

    Description:


    apache2-mod_security2 has been updated to Version 2.7.1.
    (FATE#309433).

    It contains a lot of bug and security fixes and also new
    features.

    * version upgrade to 2.7.1. [fate#309433]
    * fix for [bnc#813190] CVE-2013-1915: Vulnerable to XXE
    attacks
    * fix for [bnc#768293]: multi-part bypass; This minor
    security threat is not mediated by the old version, and the
    corresponding configuration directives are not present
    there.
    * new configuration framework private to mod_security2:
    /etc/apache2/conf.d/mod_security2.conf loads
    /usr/share/apache2-mod_security2/rules/modsecurity_crs_10_se
    tup.conf, then /etc/apache2/mod_security2.d/*.conf , as set
    up based on advice in /etc/apache2/conf.d/mod_security2.conf
    * New from 2.5.6 to 2.7.1 (excerpt, the most important
    changes): o GPLv2 replaced by Apache License v2 o rules are
    not part of the source tarball any longer, but maintaned
    upstream externally, and included in this package. o
    documentation was externalized to a wiki. Package contains
    the FAQ and the reference manual in html form. o renamed
    the term "Encryption" in directives that actually refer to
    hashes. See CHANGES file for more details. o byte
    conversion issues on s390x when logging fixed. o many small
    issues fixed that were discovered by a Coverity scanner o
    updated reference manual o wrong time calculation when
    logging for some timezones fixed. o replaced time-measuring
    mechanism with finer granularity for measured
    request/answer phases. (Stopwatch remains for compat.) o
    cookie parser memory leak fix o parsing of quoted strings
    in multipart Content-Disposition headers fixed.
    *
    apache2-mod_security2-CVE-2009-5031_CVE-2012-2751.diff: 2
    CVE IDs for the same issue that was incompletely fixed in
    2009. Fix for improper handling of quotes of request
    parameter values in the Content-Disposition field of a
    request with a multipart/form-data Content-Type header.
    This is CVE-2009-5031 and CVE-2012-2751. [bnc#768293]

    Please note that both mod_security2 and mod_unique_id
    (which is required by mod_security2) modules need to be
    enabled at the same time. [bnc#811624]

    Security Issue references:

    * CVE-2012-4528
    >
    * CVE-2013-1915
    >

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Linux Enterprise Software Development Kit 11 SP2:
      zypper in -t patch sdksp2-apache2-mod_security2-7606

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64) [New Version: 2.7.1]:
    • apache2-mod_security2-2.7.1-0.2.12.1

    References:

    • http://support.novell.com/security/cve/CVE-2012-4528.html
    • http://support.novell.com/security/cve/CVE-2013-1915.html
    • https://bugzilla.novell.com/768293
    • https://bugzilla.novell.com/789393
    • https://bugzilla.novell.com/811624
    • https://bugzilla.novell.com/813190
    • http://download.suse.com/patch/finder/?keywords=e34478a88c1cc9a22674b27f59b84c88