<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for apache2</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2018:2554-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-08-30T06:44:40Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-08-30T06:44:40Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-08-30T06:44:40Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for apache2</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for apache2 fixes the following issues:

Security issues fixed:

- CVE-2016-8743: Fixed liberal whitespace interpretation accepted from requests
  and sent in response lines and headers. Accepting these different behaviors
  represented a security concern when httpd participates in any chain of
  proxies or interacts with back-end application servers, either through
  mod_proxy or using conventional CGI mechanisms, and may result in request
  smuggling, response splitting and cache pollution. (bsc#1016715)
- CVE-2016-4975: Fixed possible CRLF injection allowing HTTP response splitting
  attacks for sites which use mod_userdir. This issue was mitigated by changes
  which prohibit CR or LF injection into the 'Location' or other outbound
  header key or value. (bsc#1104826)
  </Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-SAP-12-SP1-2018-1791,SUSE-SLE-SERVER-12-SP1-2018-1791</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20182554-1/</URL>
      <Description>Link for SUSE-SU-2018:2554-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2018-August/004509.html</URL>
      <Description>E-Mail link for SUSE-SU-2018:2554-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1016715</URL>
      <Description>SUSE Bug 1016715</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1104826</URL>
      <Description>SUSE Bug 1104826</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-4975/</URL>
      <Description>SUSE CVE CVE-2016-4975 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8743/</URL>
      <Description>SUSE CVE CVE-2016-8743 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12 SP1-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12 SP1-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP1-LTSS" CPE="cpe:/o:suse:sles-ltss:12:sp1">SUSE Linux Enterprise Server 12 SP1-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1" CPE="cpe:/o:suse:sles_sap:12:sp1">SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="apache2-2.4.16-20.19.1">
      <FullProductName ProductID="apache2-2.4.16-20.19.1">apache2-2.4.16-20.19.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-doc-2.4.16-20.19.1">
      <FullProductName ProductID="apache2-doc-2.4.16-20.19.1">apache2-doc-2.4.16-20.19.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-example-pages-2.4.16-20.19.1">
      <FullProductName ProductID="apache2-example-pages-2.4.16-20.19.1">apache2-example-pages-2.4.16-20.19.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-prefork-2.4.16-20.19.1">
      <FullProductName ProductID="apache2-prefork-2.4.16-20.19.1">apache2-prefork-2.4.16-20.19.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-utils-2.4.16-20.19.1">
      <FullProductName ProductID="apache2-utils-2.4.16-20.19.1">apache2-utils-2.4.16-20.19.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-worker-2.4.16-20.19.1">
      <FullProductName ProductID="apache2-worker-2.4.16-20.19.1">apache2-worker-2.4.16-20.19.1</FullProductName>
    </Branch>
    <Relationship ProductReference="apache2-2.4.16-20.19.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP1-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.19.1">apache2-2.4.16-20.19.1 as a component of SUSE Linux Enterprise Server 12 SP1-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-doc-2.4.16-20.19.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP1-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-doc-2.4.16-20.19.1">apache2-doc-2.4.16-20.19.1 as a component of SUSE Linux Enterprise Server 12 SP1-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-example-pages-2.4.16-20.19.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP1-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.19.1">apache2-example-pages-2.4.16-20.19.1 as a component of SUSE Linux Enterprise Server 12 SP1-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-prefork-2.4.16-20.19.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP1-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.19.1">apache2-prefork-2.4.16-20.19.1 as a component of SUSE Linux Enterprise Server 12 SP1-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-utils-2.4.16-20.19.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP1-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.19.1">apache2-utils-2.4.16-20.19.1 as a component of SUSE Linux Enterprise Server 12 SP1-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-worker-2.4.16-20.19.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP1-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.19.1">apache2-worker-2.4.16-20.19.1 as a component of SUSE Linux Enterprise Server 12 SP1-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-2.4.16-20.19.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-20.19.1">apache2-2.4.16-20.19.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-doc-2.4.16-20.19.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-doc-2.4.16-20.19.1">apache2-doc-2.4.16-20.19.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-example-pages-2.4.16-20.19.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-20.19.1">apache2-example-pages-2.4.16-20.19.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-prefork-2.4.16-20.19.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-20.19.1">apache2-prefork-2.4.16-20.19.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-utils-2.4.16-20.19.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-20.19.1">apache2-utils-2.4.16-20.19.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-worker-2.4.16-20.19.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-20.19.1">apache2-worker-2.4.16-20.19.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Possible CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir. This issue was mitigated by changes made in 2.4.25 and 2.2.32 which prohibit CR or LF injection into the "Location" or other outbound header key or value. Fixed in Apache HTTP Server 2.4.25 (Affected 2.4.1-2.4.23). Fixed in Apache HTTP Server 2.2.32 (Affected 2.2.0-2.2.31).</Note>
    </Notes>
    <CVE>CVE-2016-4975</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-doc-2.4.16-20.19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-20.19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-doc-2.4.16-20.19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-20.19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-20.19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-20.19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-20.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20182554-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-4975.html</URL>
        <Description>CVE-2016-4975</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1104826</URL>
        <Description>SUSE Bug 1104826</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution.</Note>
    </Notes>
    <CVE>CVE-2016-8743</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-2.4.16-20.19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-doc-2.4.16-20.19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-example-pages-2.4.16-20.19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-prefork-2.4.16-20.19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-utils-2.4.16-20.19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1-LTSS:apache2-worker-2.4.16-20.19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-2.4.16-20.19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-doc-2.4.16-20.19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-example-pages-2.4.16-20.19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-prefork-2.4.16-20.19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-utils-2.4.16-20.19.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:apache2-worker-2.4.16-20.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20182554-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8743.html</URL>
        <Description>CVE-2016-8743</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1016715</URL>
        <Description>SUSE Bug 1016715</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1033513</URL>
        <Description>SUSE Bug 1033513</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1086774</URL>
        <Description>SUSE Bug 1086774</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1104826</URL>
        <Description>SUSE Bug 1104826</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/930944</URL>
        <Description>SUSE Bug 930944</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
