Security update for Apache2

SUSE Security Update: Security update for Apache2
Announcement ID: SUSE-SU-2013:1381-1
Rating: moderate
References: #791794 #815621 #829056 #829057
Affected Products:
  • SUSE Linux Enterprise Software Development Kit 11 SP3
  • SUSE Linux Enterprise Software Development Kit 11 SP2
  • SUSE Linux Enterprise Server 11 SP3 for VMware
  • SUSE Linux Enterprise Server 11 SP3
  • SUSE Linux Enterprise Server 11 SP2 for VMware
  • SUSE Linux Enterprise Server 11 SP2

  • An update that solves two vulnerabilities and has two fixes is now available.

    Description:


    This collective update for Apache provides the following
    fixes:

    *

    Make sure that input that has already arrived on the
    socket is not discarded during a non-blocking read (read(2)
    returns 0 and errno is set to -EAGAIN). (bnc#815621)

    *

    Close the connection just before an attempted
    re-negotiation if data has been read with pipelining. This
    is done by resetting the keepalive status. (bnc#815621)

    *

    Reset the renegotiation status of a client<->server
    connection to RENEG_INIT to prevent falsely assumed status.
    (bnc#791794)

    *

    "OPTIONS *" internal requests are intercepted by a
    dummy filter that kicks in for the OPTIONS method. Apple
    iPrint uses "OPTIONS *" to upgrade the connection to
    TLS/1.0 following RFC 2817. For compatibility, check if an
    Upgrade request header is present and skip the filter if
    yes. (bnc#791794)

    *

    Sending a MERGE request against a URI handled by
    mod_dav_svn with the source href (sent as part of the
    request body as XML) pointing to a URI that is not
    configured for DAV will trigger a segfault. (bnc#829056,
    CVE-2013-1896)

    *

    Client data written to the RewriteLog must have
    terminal escape sequences escaped. (bnc#829057,
    CVE-2013-1862)

    Security Issue references:

    * CVE-2013-1896
    >
    * CVE-2013-1862
    >

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Linux Enterprise Software Development Kit 11 SP3:
      zypper in -t patch sdksp3-apache2-8138
    • SUSE Linux Enterprise Software Development Kit 11 SP2:
      zypper in -t patch sdksp2-apache2-8137
    • SUSE Linux Enterprise Server 11 SP3 for VMware:
      zypper in -t patch slessp3-apache2-8138
    • SUSE Linux Enterprise Server 11 SP3:
      zypper in -t patch slessp3-apache2-8138
    • SUSE Linux Enterprise Server 11 SP2 for VMware:
      zypper in -t patch slessp2-apache2-8137
    • SUSE Linux Enterprise Server 11 SP2:
      zypper in -t patch slessp2-apache2-8137

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 ia64 ppc64 s390x x86_64):
    • apache2-devel-2.2.12-1.40.1
    • SUSE Linux Enterprise Software Development Kit 11 SP3 (i586 x86_64):
    • apache2-2.2.12-1.40.1
    • apache2-doc-2.2.12-1.40.1
    • apache2-example-pages-2.2.12-1.40.1
    • apache2-prefork-2.2.12-1.40.1
    • apache2-utils-2.2.12-1.40.1
    • apache2-worker-2.2.12-1.40.1
    • SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 ia64 ppc64 s390x x86_64):
    • apache2-devel-2.2.12-1.40.1
    • SUSE Linux Enterprise Software Development Kit 11 SP2 (i586 x86_64):
    • apache2-2.2.12-1.40.1
    • apache2-doc-2.2.12-1.40.1
    • apache2-example-pages-2.2.12-1.40.1
    • apache2-prefork-2.2.12-1.40.1
    • apache2-utils-2.2.12-1.40.1
    • apache2-worker-2.2.12-1.40.1
    • SUSE Linux Enterprise Server 11 SP3 for VMware (i586 x86_64):
    • apache2-2.2.12-1.40.1
    • apache2-doc-2.2.12-1.40.1
    • apache2-example-pages-2.2.12-1.40.1
    • apache2-prefork-2.2.12-1.40.1
    • apache2-utils-2.2.12-1.40.1
    • apache2-worker-2.2.12-1.40.1
    • SUSE Linux Enterprise Server 11 SP3 (i586 ia64 ppc64 s390x x86_64):
    • apache2-2.2.12-1.40.1
    • apache2-doc-2.2.12-1.40.1
    • apache2-example-pages-2.2.12-1.40.1
    • apache2-prefork-2.2.12-1.40.1
    • apache2-utils-2.2.12-1.40.1
    • apache2-worker-2.2.12-1.40.1
    • SUSE Linux Enterprise Server 11 SP2 for VMware (i586 x86_64):
    • apache2-2.2.12-1.40.1
    • apache2-doc-2.2.12-1.40.1
    • apache2-example-pages-2.2.12-1.40.1
    • apache2-prefork-2.2.12-1.40.1
    • apache2-utils-2.2.12-1.40.1
    • apache2-worker-2.2.12-1.40.1
    • SUSE Linux Enterprise Server 11 SP2 (i586 ia64 ppc64 s390x x86_64):
    • apache2-2.2.12-1.40.1
    • apache2-doc-2.2.12-1.40.1
    • apache2-example-pages-2.2.12-1.40.1
    • apache2-prefork-2.2.12-1.40.1
    • apache2-utils-2.2.12-1.40.1
    • apache2-worker-2.2.12-1.40.1

    References:

    • http://support.novell.com/security/cve/CVE-2013-1862.html
    • http://support.novell.com/security/cve/CVE-2013-1896.html
    • https://bugzilla.novell.com/791794
    • https://bugzilla.novell.com/815621
    • https://bugzilla.novell.com/829056
    • https://bugzilla.novell.com/829057
    • http://download.suse.com/patch/finder/?keywords=106ec7308fc7232703cf87a5a41c5c46
    • http://download.suse.com/patch/finder/?keywords=a26f350e03bfdb5e4f778c3a5f45a1ad