Security update for apache2
Announcement ID: | SUSE-SU-2022:0928-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves four vulnerabilities and has three security fixes can now be installed.
Description:
This update for apache2 fixes the following issues:
- CVE-2022-23943: heap out-of-bounds write in mod_sed (bsc#1197098).
- CVE-2022-22720: HTTP request smuggling due to incorrect error handling (bsc#1197095).
- CVE-2022-22719: use of uninitialized value of in r:parsebody in mod_lua (bsc#1197091).
- CVE-2022-22721: possible buffer overflow with very large or unlimited LimitXMLRequestBody (bsc#1197096).
Also TLS 1.3 support and openssl 1.1.1 usage was disabled again as it caused regressions in various usage scenarios due to the combination between openssl 1.0.2 and 1.1.1 linkage without correct symbol versions by other libraries / tools. (bsc#1197301 bsc#1197177 bsc#1196249)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Software Development Kit 12 SP5
zypper in -t patch SUSE-SLE-SDK-12-SP5-2022-928=1
-
SUSE Linux Enterprise High Performance Computing 12 SP5
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2022-928=1
-
SUSE Linux Enterprise Server 12 SP5
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2022-928=1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP5
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2022-928=1
Package List:
-
SUSE Linux Enterprise Software Development Kit 12 SP5 (aarch64 ppc64le s390x x86_64)
- apache2-debugsource-2.4.51-35.13.1
- apache2-debuginfo-2.4.51-35.13.1
- apache2-devel-2.4.51-35.13.1
-
SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64)
- apache2-example-pages-2.4.51-35.13.1
- apache2-prefork-2.4.51-35.13.1
- apache2-utils-2.4.51-35.13.1
- apache2-worker-2.4.51-35.13.1
- apache2-utils-debuginfo-2.4.51-35.13.1
- apache2-2.4.51-35.13.1
- apache2-debugsource-2.4.51-35.13.1
- apache2-worker-debuginfo-2.4.51-35.13.1
- apache2-prefork-debuginfo-2.4.51-35.13.1
- apache2-debuginfo-2.4.51-35.13.1
-
SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch)
- apache2-doc-2.4.51-35.13.1
-
SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64)
- apache2-example-pages-2.4.51-35.13.1
- apache2-prefork-2.4.51-35.13.1
- apache2-utils-2.4.51-35.13.1
- apache2-worker-2.4.51-35.13.1
- apache2-utils-debuginfo-2.4.51-35.13.1
- apache2-2.4.51-35.13.1
- apache2-debugsource-2.4.51-35.13.1
- apache2-worker-debuginfo-2.4.51-35.13.1
- apache2-prefork-debuginfo-2.4.51-35.13.1
- apache2-debuginfo-2.4.51-35.13.1
-
SUSE Linux Enterprise Server 12 SP5 (noarch)
- apache2-doc-2.4.51-35.13.1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64)
- apache2-example-pages-2.4.51-35.13.1
- apache2-prefork-2.4.51-35.13.1
- apache2-utils-2.4.51-35.13.1
- apache2-worker-2.4.51-35.13.1
- apache2-utils-debuginfo-2.4.51-35.13.1
- apache2-2.4.51-35.13.1
- apache2-debugsource-2.4.51-35.13.1
- apache2-worker-debuginfo-2.4.51-35.13.1
- apache2-prefork-debuginfo-2.4.51-35.13.1
- apache2-debuginfo-2.4.51-35.13.1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch)
- apache2-doc-2.4.51-35.13.1
References:
- https://www.suse.com/security/cve/CVE-2022-22719.html
- https://www.suse.com/security/cve/CVE-2022-22720.html
- https://www.suse.com/security/cve/CVE-2022-22721.html
- https://www.suse.com/security/cve/CVE-2022-23943.html
- https://bugzilla.suse.com/show_bug.cgi?id=1196249
- https://bugzilla.suse.com/show_bug.cgi?id=1197091
- https://bugzilla.suse.com/show_bug.cgi?id=1197095
- https://bugzilla.suse.com/show_bug.cgi?id=1197096
- https://bugzilla.suse.com/show_bug.cgi?id=1197098
- https://bugzilla.suse.com/show_bug.cgi?id=1197177
- https://bugzilla.suse.com/show_bug.cgi?id=1197301