SUSE Security Update: Security update for apache2-mod_perl
______________________________________________________________________________

Announcement ID:    SUSE-SU-2019:3213-1
Rating:             moderate
References:         #1091625 #1156944 
Cross-References:   CVE-2011-2767
Affected Products:
                    SUSE Linux Enterprise Software Development Kit 12-SP5
                    SUSE Linux Enterprise Software Development Kit 12-SP4
                    SUSE Linux Enterprise Server 12-SP5
                    SUSE Linux Enterprise Server 12-SP4
______________________________________________________________________________

   An update that solves one vulnerability and has one errata
   is now available.

Description:

   This update for apache2-mod_perl fixes the following issues:

   Security issue fixed:

   - CVE-2011-2767: Fixed a vulnerability which could have allowed perl code
     execution in the context of user account (bsc#1156944).

   Other issue addressed:

   - Restore process name after sv_setpv_mg() call. (bsc#1091625)


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Software Development Kit 12-SP5:

      zypper in -t patch SUSE-SLE-SDK-12-SP5-2019-3213=1

   - SUSE Linux Enterprise Software Development Kit 12-SP4:

      zypper in -t patch SUSE-SLE-SDK-12-SP4-2019-3213=1

   - SUSE Linux Enterprise Server 12-SP5:

      zypper in -t patch SUSE-SLE-SERVER-12-SP5-2019-3213=1

   - SUSE Linux Enterprise Server 12-SP4:

      zypper in -t patch SUSE-SLE-SERVER-12-SP4-2019-3213=1



Package List:

   - SUSE Linux Enterprise Software Development Kit 12-SP5 (aarch64 ppc64le s390x x86_64):

      apache2-mod_perl-debuginfo-2.0.8-13.5.1
      apache2-mod_perl-debugsource-2.0.8-13.5.1
      apache2-mod_perl-devel-2.0.8-13.5.1

   - SUSE Linux Enterprise Software Development Kit 12-SP4 (aarch64 ppc64le s390x x86_64):

      apache2-mod_perl-debuginfo-2.0.8-13.5.1
      apache2-mod_perl-debugsource-2.0.8-13.5.1
      apache2-mod_perl-devel-2.0.8-13.5.1

   - SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64):

      apache2-mod_perl-2.0.8-13.5.1
      apache2-mod_perl-debuginfo-2.0.8-13.5.1
      apache2-mod_perl-debugsource-2.0.8-13.5.1

   - SUSE Linux Enterprise Server 12-SP4 (aarch64 ppc64le s390x x86_64):

      apache2-mod_perl-2.0.8-13.5.1
      apache2-mod_perl-debuginfo-2.0.8-13.5.1
      apache2-mod_perl-debugsource-2.0.8-13.5.1


References:

   https://www.suse.com/security/cve/CVE-2011-2767.html
   https://bugzilla.suse.com/1091625
   https://bugzilla.suse.com/1156944

_______________________________________________
sle-security-updates mailing list
sle-security-updates@lists.suse.com
http://lists.suse.com/mailman/listinfo/sle-security-updates

SUSE: 2019:3213-1 moderate: apache2-mod_perl

December 10, 2019
An update that solves one vulnerability and has one errata is now available

Summary

This update for apache2-mod_perl fixes the following issues: Security issue fixed: - CVE-2011-2767: Fixed a vulnerability which could have allowed perl code execution in the context of user account (bsc#1156944). Other issue addressed: - Restore process name after sv_setpv_mg() call. (bsc#1091625) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12-SP5: zypper in -t patch SUSE-SLE-SDK-12-SP5-2019-3213=1 - SUSE Linux Enterprise Software Development Kit 12-SP4: zypper in -t patch SUSE-SLE-SDK-12-SP4-2019-3213=1 - SUSE Linux Enterprise Server 12-SP5: zypper in -t patch SUSE-SLE-SERVER-12-SP5-2019-3213=1 - SUSE Linux Enterprise Server 12-SP4: zypper in -t patch SUSE-SLE-SERVER-12-SP4-2019-3213=1 Package List: - SUSE Linux Enterprise Software Development Kit 12-SP5 (aarch64 ppc64le s390x x86_64): apache2-mod_perl-debuginfo-2.0.8-13.5.1 apache2-mod_perl-debugsource-2.0.8-13.5.1 apache2-mod_perl-devel-2.0.8-13.5.1 - SUSE Linux Enterprise Software Development Kit 12-SP4 (aarch64 ppc64le s390x x86_64): apache2-mod_perl-debuginfo-2.0.8-13.5.1 apache2-mod_perl-debugsource-2.0.8-13.5.1 apache2-mod_perl-devel-2.0.8-13.5.1 - SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64): apache2-mod_perl-2.0.8-13.5.1 apache2-mod_perl-debuginfo-2.0.8-13.5.1 apache2-mod_perl-debugsource-2.0.8-13.5.1 - SUSE Linux Enterprise Server 12-SP4 (aarch64 ppc64le s390x x86_64): apache2-mod_perl-2.0.8-13.5.1 apache2-mod_perl-debuginfo-2.0.8-13.5.1 apache2-mod_perl-debugsource-2.0.8-13.5.1

References

#1091625 #1156944

Cross- CVE-2011-2767

Affected Products:

SUSE Linux Enterprise Software Development Kit 12-SP5

SUSE Linux Enterprise Software Development Kit 12-SP4

SUSE Linux Enterprise Server 12-SP5

SUSE Linux Enterprise Server 12-SP4

https://www.suse.com/security/cve/CVE-2011-2767.html

https://bugzilla.suse.com/1091625

https://bugzilla.suse.com/1156944

Severity
Announcement ID: SUSE-SU-2019:3213-1
Rating: moderate

Related News