<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for apache2</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2015:0974-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2015-04-10T12:24:10Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2015-04-10T12:24:10Z</InitialReleaseDate>
    <CurrentReleaseDate>2015-04-10T12:24:10Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for apache2</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">Apache2 updated to fix four security issues and one non-security bug.

The following vulnerabilities have been fixed:

- mod_headers rules could be bypassed via chunked requests. Adds 'MergeTrailers'
  directive to restore legacy behavior. (bsc#871310, CVE-2013-5704)
- An empty value in Content-Type could lead to a crash through a null pointer
  dereference and a denial of service. (bsc#899836, CVE-2014-3581)
- Remote attackers could bypass intended access restrictions in mod_lua
  LuaAuthzProvider when multiple Require directives with different arguments
  are used. (bsc#909715, CVE-2014-8109)
- Remote attackers could cause a denial of service (child-process crash) by
  sending a crafted WebSocket Ping frame after a Lua script has called the
  wsupgrade function. (bsc#918352, CVE-2015-0228)

The following non-security issues have been fixed:

- The Apache2 systemd service file was changed to fix situation where apache wouldn't
  start at boot when using an encrypted certificate because the user wasn't prompted
  for password during boot. (bsc#792309)

Additionally, mod_imagemap is now included by default in the package. (bsc#923090)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-SDK-12-2015-226,SUSE-SLE-SERVER-12-2015-226</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150974-1/</URL>
      <Description>Link for SUSE-SU-2015:0974-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2015-June/001415.html</URL>
      <Description>E-Mail link for SUSE-SU-2015:0974-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/792309</URL>
      <Description>SUSE Bug 792309</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/871310</URL>
      <Description>SUSE Bug 871310</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/899836</URL>
      <Description>SUSE Bug 899836</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/909715</URL>
      <Description>SUSE Bug 909715</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/918352</URL>
      <Description>SUSE Bug 918352</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/923090</URL>
      <Description>SUSE Bug 923090</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-5704/</URL>
      <Description>SUSE CVE CVE-2013-5704 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-3581/</URL>
      <Description>SUSE CVE CVE-2014-3581 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-8109/</URL>
      <Description>SUSE CVE CVE-2014-8109 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-0228/</URL>
      <Description>SUSE CVE CVE-2015-0228 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12" CPE="cpe:/o:suse:sles:12">SUSE Linux Enterprise Server 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 12">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 12">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12" CPE="cpe:/o:suse:sles_sap:12">SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Software Development Kit 12">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Software Development Kit 12">
        <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12" CPE="cpe:/o:suse:sle-sdk:12">SUSE Linux Enterprise Software Development Kit 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="apache2-devel-2.4.10-12.1">
      <FullProductName ProductID="apache2-devel-2.4.10-12.1">apache2-devel-2.4.10-12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-2.4.10-12.1">
      <FullProductName ProductID="apache2-2.4.10-12.1">apache2-2.4.10-12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-doc-2.4.10-12.1">
      <FullProductName ProductID="apache2-doc-2.4.10-12.1">apache2-doc-2.4.10-12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-example-pages-2.4.10-12.1">
      <FullProductName ProductID="apache2-example-pages-2.4.10-12.1">apache2-example-pages-2.4.10-12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-prefork-2.4.10-12.1">
      <FullProductName ProductID="apache2-prefork-2.4.10-12.1">apache2-prefork-2.4.10-12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-utils-2.4.10-12.1">
      <FullProductName ProductID="apache2-utils-2.4.10-12.1">apache2-utils-2.4.10-12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-worker-2.4.10-12.1">
      <FullProductName ProductID="apache2-worker-2.4.10-12.1">apache2-worker-2.4.10-12.1</FullProductName>
    </Branch>
    <Relationship ProductReference="apache2-2.4.10-12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12:apache2-2.4.10-12.1">apache2-2.4.10-12.1 as a component of SUSE Linux Enterprise Server 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-doc-2.4.10-12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12:apache2-doc-2.4.10-12.1">apache2-doc-2.4.10-12.1 as a component of SUSE Linux Enterprise Server 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-example-pages-2.4.10-12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12:apache2-example-pages-2.4.10-12.1">apache2-example-pages-2.4.10-12.1 as a component of SUSE Linux Enterprise Server 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-prefork-2.4.10-12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12:apache2-prefork-2.4.10-12.1">apache2-prefork-2.4.10-12.1 as a component of SUSE Linux Enterprise Server 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-utils-2.4.10-12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12:apache2-utils-2.4.10-12.1">apache2-utils-2.4.10-12.1 as a component of SUSE Linux Enterprise Server 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-worker-2.4.10-12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12:apache2-worker-2.4.10-12.1">apache2-worker-2.4.10-12.1 as a component of SUSE Linux Enterprise Server 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-2.4.10-12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:apache2-2.4.10-12.1">apache2-2.4.10-12.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-doc-2.4.10-12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:apache2-doc-2.4.10-12.1">apache2-doc-2.4.10-12.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-example-pages-2.4.10-12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:apache2-example-pages-2.4.10-12.1">apache2-example-pages-2.4.10-12.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-prefork-2.4.10-12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:apache2-prefork-2.4.10-12.1">apache2-prefork-2.4.10-12.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-utils-2.4.10-12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:apache2-utils-2.4.10-12.1">apache2-utils-2.4.10-12.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-worker-2.4.10-12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:apache2-worker-2.4.10-12.1">apache2-worker-2.4.10-12.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-devel-2.4.10-12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 12">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12:apache2-devel-2.4.10-12.1">apache2-devel-2.4.10-12.1 as a component of SUSE Linux Enterprise Software Development Kit 12</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mod_headers module in the Apache HTTP Server 2.2.22 allows remote attackers to bypass "RequestHeader unset" directives by placing a header in the trailer portion of data sent with chunked transfer coding.  NOTE: the vendor states "this is not a security issue in httpd as such."</Note>
    </Notes>
    <CVE>CVE-2013-5704</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12:apache2-2.4.10-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-doc-2.4.10-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-example-pages-2.4.10-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-prefork-2.4.10-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-utils-2.4.10-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-worker-2.4.10-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-2.4.10-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-doc-2.4.10-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-example-pages-2.4.10-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-prefork-2.4.10-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-utils-2.4.10-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-worker-2.4.10-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:apache2-devel-2.4.10-12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150974-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-5704.html</URL>
        <Description>CVE-2013-5704</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/871310</URL>
        <Description>SUSE Bug 871310</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/914535</URL>
        <Description>SUSE Bug 914535</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/930944</URL>
        <Description>SUSE Bug 930944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938728</URL>
        <Description>SUSE Bug 938728</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The cache_merge_headers_out function in modules/cache/cache_util.c in the mod_cache module in the Apache HTTP Server before 2.4.11 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty HTTP Content-Type header.</Note>
    </Notes>
    <CVE>CVE-2014-3581</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12:apache2-2.4.10-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-doc-2.4.10-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-example-pages-2.4.10-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-prefork-2.4.10-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-utils-2.4.10-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-worker-2.4.10-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-2.4.10-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-doc-2.4.10-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-example-pages-2.4.10-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-prefork-2.4.10-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-utils-2.4.10-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-worker-2.4.10-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:apache2-devel-2.4.10-12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150974-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3581.html</URL>
        <Description>CVE-2014-3581</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/899836</URL>
        <Description>SUSE Bug 899836</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">mod_lua.c in the mod_lua module in the Apache HTTP Server 2.3.x and 2.4.x through 2.4.10 does not support an httpd configuration in which the same Lua authorization provider is used with different arguments within different contexts, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging multiple Require directives, as demonstrated by a configuration that specifies authorization for one group to access a certain directory, and authorization for a second group to access a second directory.</Note>
    </Notes>
    <CVE>CVE-2014-8109</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12:apache2-2.4.10-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-doc-2.4.10-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-example-pages-2.4.10-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-prefork-2.4.10-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-utils-2.4.10-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-worker-2.4.10-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-2.4.10-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-doc-2.4.10-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-example-pages-2.4.10-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-prefork-2.4.10-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-utils-2.4.10-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-worker-2.4.10-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:apache2-devel-2.4.10-12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150974-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-8109.html</URL>
        <Description>CVE-2014-8109</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/909715</URL>
        <Description>SUSE Bug 909715</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The lua_websocket_read function in lua_request.c in the mod_lua module in the Apache HTTP Server through 2.4.12 allows remote attackers to cause a denial of service (child-process crash) by sending a crafted WebSocket Ping frame after a Lua script has called the wsupgrade function.</Note>
    </Notes>
    <CVE>CVE-2015-0228</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12:apache2-2.4.10-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-doc-2.4.10-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-example-pages-2.4.10-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-prefork-2.4.10-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-utils-2.4.10-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-worker-2.4.10-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-2.4.10-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-doc-2.4.10-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-example-pages-2.4.10-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-prefork-2.4.10-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-utils-2.4.10-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-worker-2.4.10-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:apache2-devel-2.4.10-12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150974-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0228.html</URL>
        <Description>CVE-2015-0228</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/918352</URL>
        <Description>SUSE Bug 918352</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
