<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for apache2</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2015:1851-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2015-10-22T09:19:23Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2015-10-22T09:19:23Z</InitialReleaseDate>
    <CurrentReleaseDate>2015-10-22T09:19:23Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for apache2</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
The Apache2 webserver was updated to fix several issues:

Security issues fixed:
- The chunked transfer coding implementation in the Apache HTTP Server
  did not properly parse chunk headers, which allowed remote attackers to
  conduct HTTP request smuggling attacks via a crafted request, related
  to mishandling of large chunk-size values and invalid chunk-extension
  characters in modules/http/http_filters.c. [bsc#938728, CVE-2015-3183]
- The LOGJAM security issue was addressed by: [bnc#931723 CVE-2015-4000]
  * changing the SSLCipherSuite cipherstring to disable export cipher
    suites and deploy Ephemeral Elliptic-Curve Diffie-Hellman (ECDHE)
    ciphers.
  * Adjust 'gensslcert' script to generate a strong and unique Diffie
    Hellman Group and append it to the server certificate file.
- The ap_some_auth_required function in server/request.c in the Apache
  HTTP Server 2.4.x did not consider that a Require directive may be
  associated with an authorization setting rather than an authentication
  setting, which allowed remote attackers to bypass intended access
  restrictions in opportunistic circumstances by leveraging the presence
  of a module that relies on the 2.2 API behavior.
  [bnc#938723 bnc#939516 CVE-2015-3185]
- Tomcat mod_jk information leak due to incorrect JkMount/JkUnmount
  directives processing [bnc#927845 CVE-2014-8111] 

Other bugs fixed:
- Now provides a suse_maintenance_mmn_# [bnc#915666].
- Hardcoded modules in the %files [bnc#444878].
- Fixed the IfModule directive around SSLSessionCache [bnc#911159].
- allow only TCP ports in Yast2 firewall files [bnc#931002]
- fixed a regression when some LDAP searches or comparisons might be done 
  with the wrong credentials when a backend connection is reused
  [bnc#930228]
- Fixed split-logfile2 script [bnc#869790]
- remove the changed MODULE_MAGIC_NUMBER_MINOR from which confuses
  modules the way that they expect functionality that our apache does
  not provide [bnc#915666]
- gensslcert: CN now defaults to `hostname -f` [bnc#949766], fix
  help [bnc#949771]
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-SDK-12-2015-772,SUSE-SLE-SERVER-12-2015-772,SUSE-Storage-1.0-2015-772</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151851-1/</URL>
      <Description>Link for SUSE-SU-2015:1851-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2015-October/001653.html</URL>
      <Description>E-Mail link for SUSE-SU-2015:1851-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/444878</URL>
      <Description>SUSE Bug 444878</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/869790</URL>
      <Description>SUSE Bug 869790</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/911159</URL>
      <Description>SUSE Bug 911159</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/915666</URL>
      <Description>SUSE Bug 915666</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/927845</URL>
      <Description>SUSE Bug 927845</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/930228</URL>
      <Description>SUSE Bug 930228</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/931002</URL>
      <Description>SUSE Bug 931002</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/931723</URL>
      <Description>SUSE Bug 931723</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/938723</URL>
      <Description>SUSE Bug 938723</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/938728</URL>
      <Description>SUSE Bug 938728</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/939516</URL>
      <Description>SUSE Bug 939516</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/949766</URL>
      <Description>SUSE Bug 949766</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/949771</URL>
      <Description>SUSE Bug 949771</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-8111/</URL>
      <Description>SUSE CVE CVE-2014-8111 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-3183/</URL>
      <Description>SUSE CVE CVE-2015-3183 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-3185/</URL>
      <Description>SUSE CVE CVE-2015-3185 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4000/</URL>
      <Description>SUSE CVE CVE-2015-4000 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Enterprise Storage 1.0">
      <Branch Type="Product Name" Name="SUSE Enterprise Storage 1.0">
        <FullProductName ProductID="SUSE Enterprise Storage 1.0" CPE="cpe:/o:suse:ses:1.0">SUSE Enterprise Storage 1.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12" CPE="cpe:/o:suse:sles:12">SUSE Linux Enterprise Server 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 12">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 12">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12" CPE="cpe:/o:suse:sles_sap:12">SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Software Development Kit 12">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Software Development Kit 12">
        <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12" CPE="cpe:/o:suse:sle-sdk:12">SUSE Linux Enterprise Software Development Kit 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="apache2-devel-2.4.10-14.10.1">
      <FullProductName ProductID="apache2-devel-2.4.10-14.10.1">apache2-devel-2.4.10-14.10.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-2.4.10-14.10.1">
      <FullProductName ProductID="apache2-2.4.10-14.10.1">apache2-2.4.10-14.10.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-doc-2.4.10-14.10.1">
      <FullProductName ProductID="apache2-doc-2.4.10-14.10.1">apache2-doc-2.4.10-14.10.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-example-pages-2.4.10-14.10.1">
      <FullProductName ProductID="apache2-example-pages-2.4.10-14.10.1">apache2-example-pages-2.4.10-14.10.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-mod_auth_kerb-5.4-2.4.1">
      <FullProductName ProductID="apache2-mod_auth_kerb-5.4-2.4.1">apache2-mod_auth_kerb-5.4-2.4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-mod_jk-1.2.40-2.6.1">
      <FullProductName ProductID="apache2-mod_jk-1.2.40-2.6.1">apache2-mod_jk-1.2.40-2.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-mod_security2-2.8.0-3.4.1">
      <FullProductName ProductID="apache2-mod_security2-2.8.0-3.4.1">apache2-mod_security2-2.8.0-3.4.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-prefork-2.4.10-14.10.1">
      <FullProductName ProductID="apache2-prefork-2.4.10-14.10.1">apache2-prefork-2.4.10-14.10.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-utils-2.4.10-14.10.1">
      <FullProductName ProductID="apache2-utils-2.4.10-14.10.1">apache2-utils-2.4.10-14.10.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-worker-2.4.10-14.10.1">
      <FullProductName ProductID="apache2-worker-2.4.10-14.10.1">apache2-worker-2.4.10-14.10.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-mod_fastcgi-2.4.7-3.4.1">
      <FullProductName ProductID="apache2-mod_fastcgi-2.4.7-3.4.1">apache2-mod_fastcgi-2.4.7-3.4.1</FullProductName>
    </Branch>
    <Relationship ProductReference="apache2-mod_fastcgi-2.4.7-3.4.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Enterprise Storage 1.0">
      <FullProductName ProductID="SUSE Enterprise Storage 1.0:apache2-mod_fastcgi-2.4.7-3.4.1">apache2-mod_fastcgi-2.4.7-3.4.1 as a component of SUSE Enterprise Storage 1.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-2.4.10-14.10.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12:apache2-2.4.10-14.10.1">apache2-2.4.10-14.10.1 as a component of SUSE Linux Enterprise Server 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-doc-2.4.10-14.10.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12:apache2-doc-2.4.10-14.10.1">apache2-doc-2.4.10-14.10.1 as a component of SUSE Linux Enterprise Server 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-example-pages-2.4.10-14.10.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12:apache2-example-pages-2.4.10-14.10.1">apache2-example-pages-2.4.10-14.10.1 as a component of SUSE Linux Enterprise Server 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-mod_auth_kerb-5.4-2.4.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12:apache2-mod_auth_kerb-5.4-2.4.1">apache2-mod_auth_kerb-5.4-2.4.1 as a component of SUSE Linux Enterprise Server 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-mod_jk-1.2.40-2.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12:apache2-mod_jk-1.2.40-2.6.1">apache2-mod_jk-1.2.40-2.6.1 as a component of SUSE Linux Enterprise Server 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-mod_security2-2.8.0-3.4.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12:apache2-mod_security2-2.8.0-3.4.1">apache2-mod_security2-2.8.0-3.4.1 as a component of SUSE Linux Enterprise Server 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-prefork-2.4.10-14.10.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12:apache2-prefork-2.4.10-14.10.1">apache2-prefork-2.4.10-14.10.1 as a component of SUSE Linux Enterprise Server 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-utils-2.4.10-14.10.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12:apache2-utils-2.4.10-14.10.1">apache2-utils-2.4.10-14.10.1 as a component of SUSE Linux Enterprise Server 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-worker-2.4.10-14.10.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12:apache2-worker-2.4.10-14.10.1">apache2-worker-2.4.10-14.10.1 as a component of SUSE Linux Enterprise Server 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-2.4.10-14.10.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:apache2-2.4.10-14.10.1">apache2-2.4.10-14.10.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-doc-2.4.10-14.10.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:apache2-doc-2.4.10-14.10.1">apache2-doc-2.4.10-14.10.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-example-pages-2.4.10-14.10.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:apache2-example-pages-2.4.10-14.10.1">apache2-example-pages-2.4.10-14.10.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-mod_auth_kerb-5.4-2.4.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:apache2-mod_auth_kerb-5.4-2.4.1">apache2-mod_auth_kerb-5.4-2.4.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-mod_jk-1.2.40-2.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:apache2-mod_jk-1.2.40-2.6.1">apache2-mod_jk-1.2.40-2.6.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-mod_security2-2.8.0-3.4.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:apache2-mod_security2-2.8.0-3.4.1">apache2-mod_security2-2.8.0-3.4.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-prefork-2.4.10-14.10.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:apache2-prefork-2.4.10-14.10.1">apache2-prefork-2.4.10-14.10.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-utils-2.4.10-14.10.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:apache2-utils-2.4.10-14.10.1">apache2-utils-2.4.10-14.10.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-worker-2.4.10-14.10.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:apache2-worker-2.4.10-14.10.1">apache2-worker-2.4.10-14.10.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-devel-2.4.10-14.10.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 12">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12:apache2-devel-2.4.10-14.10.1">apache2-devel-2.4.10-14.10.1 as a component of SUSE Linux Enterprise Software Development Kit 12</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Apache Tomcat Connectors (mod_jk) before 1.2.41 ignores JkUnmount rules for subtrees of previous JkMount rules, which allows remote attackers to access otherwise restricted artifacts via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2014-8111</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 1.0:apache2-mod_fastcgi-2.4.7-3.4.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-2.4.10-14.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-doc-2.4.10-14.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-example-pages-2.4.10-14.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-mod_auth_kerb-5.4-2.4.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-mod_jk-1.2.40-2.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-mod_security2-2.8.0-3.4.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-prefork-2.4.10-14.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-utils-2.4.10-14.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-worker-2.4.10-14.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-2.4.10-14.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-doc-2.4.10-14.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-example-pages-2.4.10-14.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-mod_auth_kerb-5.4-2.4.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-mod_jk-1.2.40-2.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-mod_security2-2.8.0-3.4.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-prefork-2.4.10-14.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-utils-2.4.10-14.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-worker-2.4.10-14.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:apache2-devel-2.4.10-14.10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151851-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-8111.html</URL>
        <Description>CVE-2014-8111</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/927845</URL>
        <Description>SUSE Bug 927845</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The chunked transfer coding implementation in the Apache HTTP Server before 2.4.14 does not properly parse chunk headers, which allows remote attackers to conduct HTTP request smuggling attacks via a crafted request, related to mishandling of large chunk-size values and invalid chunk-extension characters in modules/http/http_filters.c.</Note>
    </Notes>
    <CVE>CVE-2015-3183</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 1.0:apache2-mod_fastcgi-2.4.7-3.4.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-2.4.10-14.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-doc-2.4.10-14.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-example-pages-2.4.10-14.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-mod_auth_kerb-5.4-2.4.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-mod_jk-1.2.40-2.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-mod_security2-2.8.0-3.4.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-prefork-2.4.10-14.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-utils-2.4.10-14.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-worker-2.4.10-14.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-2.4.10-14.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-doc-2.4.10-14.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-example-pages-2.4.10-14.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-mod_auth_kerb-5.4-2.4.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-mod_jk-1.2.40-2.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-mod_security2-2.8.0-3.4.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-prefork-2.4.10-14.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-utils-2.4.10-14.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-worker-2.4.10-14.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:apache2-devel-2.4.10-14.10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151851-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3183.html</URL>
        <Description>CVE-2015-3183</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938728</URL>
        <Description>SUSE Bug 938728</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/948325</URL>
        <Description>SUSE Bug 948325</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/949218</URL>
        <Description>SUSE Bug 949218</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ap_some_auth_required function in server/request.c in the Apache HTTP Server 2.4.x before 2.4.14 does not consider that a Require directive may be associated with an authorization setting rather than an authentication setting, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging the presence of a module that relies on the 2.2 API behavior.</Note>
    </Notes>
    <CVE>CVE-2015-3185</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 1.0:apache2-mod_fastcgi-2.4.7-3.4.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-2.4.10-14.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-doc-2.4.10-14.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-example-pages-2.4.10-14.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-mod_auth_kerb-5.4-2.4.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-mod_jk-1.2.40-2.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-mod_security2-2.8.0-3.4.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-prefork-2.4.10-14.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-utils-2.4.10-14.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-worker-2.4.10-14.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-2.4.10-14.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-doc-2.4.10-14.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-example-pages-2.4.10-14.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-mod_auth_kerb-5.4-2.4.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-mod_jk-1.2.40-2.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-mod_security2-2.8.0-3.4.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-prefork-2.4.10-14.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-utils-2.4.10-14.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-worker-2.4.10-14.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:apache2-devel-2.4.10-14.10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151851-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3185.html</URL>
        <Description>CVE-2015-3185</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938723</URL>
        <Description>SUSE Bug 938723</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/939514</URL>
        <Description>SUSE Bug 939514</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/939516</URL>
        <Description>SUSE Bug 939516</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the "Logjam" issue.</Note>
    </Notes>
    <CVE>CVE-2015-4000</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 1.0:apache2-mod_fastcgi-2.4.7-3.4.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-2.4.10-14.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-doc-2.4.10-14.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-example-pages-2.4.10-14.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-mod_auth_kerb-5.4-2.4.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-mod_jk-1.2.40-2.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-mod_security2-2.8.0-3.4.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-prefork-2.4.10-14.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-utils-2.4.10-14.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12:apache2-worker-2.4.10-14.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-2.4.10-14.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-doc-2.4.10-14.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-example-pages-2.4.10-14.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-mod_auth_kerb-5.4-2.4.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-mod_jk-1.2.40-2.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-mod_security2-2.8.0-3.4.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-prefork-2.4.10-14.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-utils-2.4.10-14.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:apache2-worker-2.4.10-14.10.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12:apache2-devel-2.4.10-14.10.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.3</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:C/I:C/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151851-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4000.html</URL>
        <Description>CVE-2015-4000</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074631</URL>
        <Description>SUSE Bug 1074631</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1211968</URL>
        <Description>SUSE Bug 1211968</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/931600</URL>
        <Description>SUSE Bug 931600</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/931698</URL>
        <Description>SUSE Bug 931698</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/931723</URL>
        <Description>SUSE Bug 931723</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/931845</URL>
        <Description>SUSE Bug 931845</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/932026</URL>
        <Description>SUSE Bug 932026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/932483</URL>
        <Description>SUSE Bug 932483</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/934789</URL>
        <Description>SUSE Bug 934789</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935033</URL>
        <Description>SUSE Bug 935033</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935540</URL>
        <Description>SUSE Bug 935540</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935979</URL>
        <Description>SUSE Bug 935979</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/937202</URL>
        <Description>SUSE Bug 937202</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/937766</URL>
        <Description>SUSE Bug 937766</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938248</URL>
        <Description>SUSE Bug 938248</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938432</URL>
        <Description>SUSE Bug 938432</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938895</URL>
        <Description>SUSE Bug 938895</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938905</URL>
        <Description>SUSE Bug 938905</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938906</URL>
        <Description>SUSE Bug 938906</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938913</URL>
        <Description>SUSE Bug 938913</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938945</URL>
        <Description>SUSE Bug 938945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/943664</URL>
        <Description>SUSE Bug 943664</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/944729</URL>
        <Description>SUSE Bug 944729</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/945582</URL>
        <Description>SUSE Bug 945582</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/955589</URL>
        <Description>SUSE Bug 955589</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980406</URL>
        <Description>SUSE Bug 980406</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/990592</URL>
        <Description>SUSE Bug 990592</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/994144</URL>
        <Description>SUSE Bug 994144</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
