SUSE-SU-2018:2815-2

Source
https://www.suse.com/support/update/announcement/2018/suse-su-20182815-2/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2018:2815-2.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2018:2815-2
Related
Published
2018-10-18T12:50:21Z
Modified
2018-10-18T12:50:21Z
Summary
Security update for apache2
Details

This update for apache2 fixes the following issues:

Security issues fixed:

  • CVE-2016-8743: Fixed liberal whitespace interpretation accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution. (bsc#1016715)
  • CVE-2016-4975: Fixed possible CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir. This issue was mitigated by changes which prohibit CR or LF injection into the 'Location' or other outbound header key or value. (bsc#1104826)
References

Affected packages

SUSE:Linux Enterprise Server 12 SP2-BCL / apache2

Package

Name
apache2
Purl
purl:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCL

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.4.23-29.24.1

Ecosystem specific

{
    "binaries": [
        {
            "apache2-example-pages": "2.4.23-29.24.1",
            "apache2-doc": "2.4.23-29.24.1",
            "apache2-worker": "2.4.23-29.24.1",
            "apache2-prefork": "2.4.23-29.24.1",
            "apache2": "2.4.23-29.24.1",
            "apache2-utils": "2.4.23-29.24.1"
        }
    ]
}