openSUSE Security Update: Security update for apache2 ______________________________________________________________________________ Announcement ID: openSUSE-SU-2014:1647-1 Rating: moderate References: #871310 Cross-References: CVE-2011-3368 CVE-2012-2687 CVE-2013-1862 CVE-2013-1896 CVE-2013-6438 CVE-2014-0098 CVE-2014-0226 CVE-2014-0231 Affected Products: openSUSE 12.3 ______________________________________________________________________________ An update that fixes 8 vulnerabilities is now available. Description: This apache version update fixes various security and non security issues. - Updated to the 2.2.29 * Changes between 2.2.22 and 2.2.29: http://www.apache.org/dist/httpd/CHANGES_2.2 * The following patches are no longer needed and were removed: * httpd-2.2.x-bnc798733-SNI_ignorecase.diff * httpd-2.2.x-bnc806458-mod_imagemap-xss.diff * httpd-2.2.x-bnc806458-mod_info_ap_get_server_name-xss.diff * httpd-2.2.x-bnc806458-mod_proxy_ftp-xss.diff * httpd-2.2.x-bnc806458-util_ldap_cache_mgr-xss.diff * httpd-2.2.x-bnc807152-mod_balancer_handler_xss.diff * httpd-mod_deflate_head.patch * httpd-new_pcre.patch * httpd-2.2.22-SSLCompression_CRIME_mitigation.patch * httpd-2.2.19-linux3.patch * httpd-2.2.x-bnc829056-CVE-2013-1896-pr1482522-mod_dav.diff * httpd-2.2.x-bnc829057-CVE-2013-1862-mod_rewrite_terminal_escape_sequences.d iff * httpd-2.2.x-bnc869105-CVE-2013-6438-mod_dav-dos.diff * httpd-2.2.x-bnc869106-CVE-2014-0098-log_cookie_c.diff * httpd-2.2.x-bnc887765-CVE-2014-0226-mod_status_race.diff * httpd-2.2.x-bnc887768-CVE-2014-0231_mod_cgid_DoS_via_no_stdin_read.diff * httpd-2.2.x-bnc777260-CVE-2012-2687-mod_negotiation_filename_xss.diff * httpd-2.2.x-CVE-2011-3368-server_protocl_c.diff * The following patches were updated for the current Apache version: * apache2-mod_ssl_npn.patch * httpd-2.0.54-envvars.dif * httpd-2.2.x-bnc690734.patch * ssl-mode-release-buffers.patch * bnc#871310 fixed in Apache httpd 2.2.29 Patch Instructions: To install this openSUSE Security Update use YaST online_update. Alternatively you can run the command listed for your product: - openSUSE 12.3: zypper in -t patch openSUSE-2014-770 To bring your system up-to-date, use "zypper patch". Package List: - openSUSE 12.3 (i586 x86_64): apache2-2.2.29-10.16.1 apache2-debuginfo-2.2.29-10.16.1 apache2-debugsource-2.2.29-10.16.1 apache2-devel-2.2.29-10.16.1 apache2-event-2.2.29-10.16.1 apache2-event-debuginfo-2.2.29-10.16.1 apache2-example-pages-2.2.29-10.16.1 apache2-itk-2.2.29-10.16.1 apache2-itk-debuginfo-2.2.29-10.16.1 apache2-prefork-2.2.29-10.16.1 apache2-prefork-debuginfo-2.2.29-10.16.1 apache2-utils-2.2.29-10.16.1 apache2-utils-debuginfo-2.2.29-10.16.1 apache2-worker-2.2.29-10.16.1 apache2-worker-debuginfo-2.2.29-10.16.1 - openSUSE 12.3 (noarch): apache2-doc-2.2.29-10.16.1 References: http://support.novell.com/security/cve/CVE-2011-3368.html http://support.novell.com/security/cve/CVE-2012-2687.html http://support.novell.com/security/cve/CVE-2013-1862.html http://support.novell.com/security/cve/CVE-2013-1896.html http://support.novell.com/security/cve/CVE-2013-6438.html http://support.novell.com/security/cve/CVE-2014-0098.html http://support.novell.com/security/cve/CVE-2014-0226.html http://support.novell.com/security/cve/CVE-2014-0231.html https://bugzilla.suse.com/show_bug.cgi?id=871310