Security update for apache2

SUSE Security Update: Security update for apache2
Announcement ID: SUSE-SU-2022:0440-1
Rating: important
References: #1193942 #1193943
Cross-References:CVE-2021-44224 CVE-2021-44790
Affected Products:
  • SUSE Linux Enterprise Server 12-SP5
  • SUSE Linux Enterprise Server for SAP Applications 12-SP5
  • SUSE Linux Enterprise Software Development Kit 12-SP5

An update that fixes two vulnerabilities, contains one feature is now available.


This update for apache2 fixes the following issues:

  • CVE-2021-44224: Fixed NULL dereference or SSRF in forward proxy configurations (bsc#1193943)
  • CVE-2021-44790: Fixed a buffer overflow when parsing multipart content in mod_lua (bsc#1193942)

This update also enables TLS 1.3 support, by building against openssl 1.1 [jsc#SLE-18664]

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE Linux Enterprise Software Development Kit 12-SP5:
    zypper in -t patch SUSE-SLE-SDK-12-SP5-2022-440=1
  • SUSE Linux Enterprise Server 12-SP5:
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-2022-440=1

Package List:

  • SUSE Linux Enterprise Software Development Kit 12-SP5 (aarch64 ppc64le s390x x86_64):
    • apache2-debuginfo-2.4.51-35.7.1
    • apache2-debugsource-2.4.51-35.7.1
    • apache2-devel-2.4.51-35.7.1
  • SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64):
    • apache2-2.4.51-35.7.1
    • apache2-debuginfo-2.4.51-35.7.1
    • apache2-debugsource-2.4.51-35.7.1
    • apache2-example-pages-2.4.51-35.7.1
    • apache2-prefork-2.4.51-35.7.1
    • apache2-prefork-debuginfo-2.4.51-35.7.1
    • apache2-utils-2.4.51-35.7.1
    • apache2-utils-debuginfo-2.4.51-35.7.1
    • apache2-worker-2.4.51-35.7.1
    • apache2-worker-debuginfo-2.4.51-35.7.1
  • SUSE Linux Enterprise Server 12-SP5 (noarch):
    • apache2-doc-2.4.51-35.7.1