Security update for Apache2

SUSE Security Update: Security update for Apache2
Announcement ID: SUSE-SU-2013:1824-1
Rating: moderate
References: #791794 #815621 #829056 #829057
Affected Products:
  • SUSE Linux Enterprise Server 11 SP1 for VMware LTSS
  • SUSE Linux Enterprise Server 11 SP1 LTSS

  • An update that solves two vulnerabilities and has two fixes is now available. It includes one version update.

    Description:


    Apache2 received an LTSS rollup update which fixes various
    security issues and bugs.

    Security issues fixed:

    * CVE-2013-1896: Sending a MERGE request against a URI
    handled by mod_dav_svn with the source href (sent as part
    of the request body as XML) pointing to a URI that is not
    configured for DAV will trigger a segfault. [bnc#829056]
    * CVE-2013-1862: client data written to the RewriteLog
    must have terminal escape sequences escaped. [bnc#829057]

    Bugs fixed:

    * make sure that input that has already arrived on the
    socket is not discarded during a non-blocking read (read(2)
    returns 0 and errno is set to -EAGAIN). [bnc#815621]
    * make ssl connection not behave as above (this is
    openssl BIO stuff). [bnc#815621]
    * close the connection just before an attempted
    re-negotiation if data has been read with pipelining. This
    is done by resetting the keepalive status. [bnc#815621]
    [L3:38943]
    * reset the renegotiation status of a client<->server
    connection to RENEG_INIT to prevent falsely assumed status.
    [bnc#791794]
    * "OPTIONS *" internal requests are intercepted by a
    dummy filter that kicks in for the OPTIONS method. Apple
    iPrint uses "OPTIONS *" to upgrade the connection to
    TLS/1.0 following rfc2817. For compatibility, check if an
    Upgrade request header is present and skip the filter if
    yes. [bnc#791794]

    Security Issue references:

    * CVE-2013-1896
    >
    * CVE-2013-1862
    >

    Patch Instructions:

    To install this SUSE Security Update use YaST online_update.
    Alternatively you can run the command listed for your product:

    • SUSE Linux Enterprise Server 11 SP1 for VMware LTSS:
      zypper in -t patch slessp1-apache2-8429
    • SUSE Linux Enterprise Server 11 SP1 LTSS:
      zypper in -t patch slessp1-apache2-8429

    To bring your system up-to-date, use "zypper patch".

    Package List:

    • SUSE Linux Enterprise Server 11 SP1 for VMware LTSS (i586 x86_64) [New Version: 2.2.12]:
    • apache2-2.2.12-1.40.7
    • apache2-doc-2.2.12-1.40.7
    • apache2-example-pages-2.2.12-1.40.7
    • apache2-prefork-2.2.12-1.40.7
    • apache2-utils-2.2.12-1.40.7
    • apache2-worker-2.2.12-1.40.7
    • SUSE Linux Enterprise Server 11 SP1 LTSS (i586 s390x x86_64) [New Version: 2.2.12]:
    • apache2-2.2.12-1.40.7
    • apache2-doc-2.2.12-1.40.7
    • apache2-example-pages-2.2.12-1.40.7
    • apache2-prefork-2.2.12-1.40.7
    • apache2-utils-2.2.12-1.40.7
    • apache2-worker-2.2.12-1.40.7

    References:

    • http://support.novell.com/security/cve/CVE-2013-1862.html
    • http://support.novell.com/security/cve/CVE-2013-1896.html
    • https://bugzilla.novell.com/791794
    • https://bugzilla.novell.com/815621
    • https://bugzilla.novell.com/829056
    • https://bugzilla.novell.com/829057
    • http://download.suse.com/patch/finder/?keywords=1788cfd4ee089aa3e421b7f8f02766fc