<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for apache2</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2018:2856-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-09-25T09:10:10Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-09-25T09:10:10Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-09-25T09:10:10Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for apache2</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for apache2 fixes the following issues:

Security issues fixed:

- CVE-2016-8743: Fixed liberal whitespace interpretation accepted from requests
  and sent in response lines and headers. Accepting these different behaviors
  represented a security concern when httpd participates in any chain of
  proxies or interacts with back-end application servers, either through
  mod_proxy or using conventional CGI mechanisms, and may result in request
  smuggling, response splitting and cache pollution. (bsc#1016715)
- CVE-2016-4975: Fixed possible CRLF injection allowing HTTP response splitting
  attacks for sites which use mod_userdir. This issue was mitigated by changes
  which prohibit CR or LF injection into the 'Location' or other outbound
  header key or value. (bsc#1104826)
  
This update was imported from the SUSE:SLE-12-SP2:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00076.html</URL>
      <Description>E-Mail link for openSUSE-SU-2018:2856-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.3">
      <Branch Type="Product Name" Name="openSUSE Leap 42.3">
        <FullProductName ProductID="openSUSE Leap 42.3">openSUSE Leap 42.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="apache2-2.4.23-28.1">
      <FullProductName ProductID="apache2-2.4.23-28.1">apache2-2.4.23-28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-devel-2.4.23-28.1">
      <FullProductName ProductID="apache2-devel-2.4.23-28.1">apache2-devel-2.4.23-28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-doc-2.4.23-28.1">
      <FullProductName ProductID="apache2-doc-2.4.23-28.1">apache2-doc-2.4.23-28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-event-2.4.23-28.1">
      <FullProductName ProductID="apache2-event-2.4.23-28.1">apache2-event-2.4.23-28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-example-pages-2.4.23-28.1">
      <FullProductName ProductID="apache2-example-pages-2.4.23-28.1">apache2-example-pages-2.4.23-28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-prefork-2.4.23-28.1">
      <FullProductName ProductID="apache2-prefork-2.4.23-28.1">apache2-prefork-2.4.23-28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-utils-2.4.23-28.1">
      <FullProductName ProductID="apache2-utils-2.4.23-28.1">apache2-utils-2.4.23-28.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-worker-2.4.23-28.1">
      <FullProductName ProductID="apache2-worker-2.4.23-28.1">apache2-worker-2.4.23-28.1</FullProductName>
    </Branch>
    <Relationship ProductReference="apache2-2.4.23-28.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:apache2-2.4.23-28.1">apache2-2.4.23-28.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-devel-2.4.23-28.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:apache2-devel-2.4.23-28.1">apache2-devel-2.4.23-28.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-doc-2.4.23-28.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:apache2-doc-2.4.23-28.1">apache2-doc-2.4.23-28.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-event-2.4.23-28.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:apache2-event-2.4.23-28.1">apache2-event-2.4.23-28.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-example-pages-2.4.23-28.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:apache2-example-pages-2.4.23-28.1">apache2-example-pages-2.4.23-28.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-prefork-2.4.23-28.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:apache2-prefork-2.4.23-28.1">apache2-prefork-2.4.23-28.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-utils-2.4.23-28.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:apache2-utils-2.4.23-28.1">apache2-utils-2.4.23-28.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-worker-2.4.23-28.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:apache2-worker-2.4.23-28.1">apache2-worker-2.4.23-28.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Possible CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir. This issue was mitigated by changes made in 2.4.25 and 2.2.32 which prohibit CR or LF injection into the "Location" or other outbound header key or value. Fixed in Apache HTTP Server 2.4.25 (Affected 2.4.1-2.4.23). Fixed in Apache HTTP Server 2.2.32 (Affected 2.2.0-2.2.31).</Note>
    </Notes>
    <CVE>CVE-2016-4975</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:apache2-2.4.23-28.1</ProductID>
        <ProductID>openSUSE Leap 42.3:apache2-devel-2.4.23-28.1</ProductID>
        <ProductID>openSUSE Leap 42.3:apache2-doc-2.4.23-28.1</ProductID>
        <ProductID>openSUSE Leap 42.3:apache2-event-2.4.23-28.1</ProductID>
        <ProductID>openSUSE Leap 42.3:apache2-example-pages-2.4.23-28.1</ProductID>
        <ProductID>openSUSE Leap 42.3:apache2-prefork-2.4.23-28.1</ProductID>
        <ProductID>openSUSE Leap 42.3:apache2-utils-2.4.23-28.1</ProductID>
        <ProductID>openSUSE Leap 42.3:apache2-worker-2.4.23-28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00076.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-4975.html</URL>
        <Description>CVE-2016-4975</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1104826</URL>
        <Description>SUSE Bug 1104826</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution.</Note>
    </Notes>
    <CVE>CVE-2016-8743</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:apache2-2.4.23-28.1</ProductID>
        <ProductID>openSUSE Leap 42.3:apache2-devel-2.4.23-28.1</ProductID>
        <ProductID>openSUSE Leap 42.3:apache2-doc-2.4.23-28.1</ProductID>
        <ProductID>openSUSE Leap 42.3:apache2-event-2.4.23-28.1</ProductID>
        <ProductID>openSUSE Leap 42.3:apache2-example-pages-2.4.23-28.1</ProductID>
        <ProductID>openSUSE Leap 42.3:apache2-prefork-2.4.23-28.1</ProductID>
        <ProductID>openSUSE Leap 42.3:apache2-utils-2.4.23-28.1</ProductID>
        <ProductID>openSUSE Leap 42.3:apache2-worker-2.4.23-28.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-09/msg00076.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8743.html</URL>
        <Description>CVE-2016-8743</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1016715</URL>
        <Description>SUSE Bug 1016715</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1033513</URL>
        <Description>SUSE Bug 1033513</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1086774</URL>
        <Description>SUSE Bug 1086774</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1104826</URL>
        <Description>SUSE Bug 1104826</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/930944</URL>
        <Description>SUSE Bug 930944</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
