{"affected":[{"ecosystem_specific":{"binaries":[{"apache2":"2.2.12-59.1","apache2-devel":"2.2.12-59.1","apache2-doc":"2.2.12-59.1","apache2-example-pages":"2.2.12-59.1","apache2-prefork":"2.2.12-59.1","apache2-utils":"2.2.12-59.1","apache2-worker":"2.2.12-59.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 11 SP3","name":"apache2","purl":"pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.2.12-59.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"apache2":"2.2.12-59.1","apache2-devel":"2.2.12-59.1","apache2-doc":"2.2.12-59.1","apache2-example-pages":"2.2.12-59.1","apache2-prefork":"2.2.12-59.1","apache2-utils":"2.2.12-59.1","apache2-worker":"2.2.12-59.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 11 SP4","name":"apache2","purl":"pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.2.12-59.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"apache2":"2.2.12-59.1","apache2-doc":"2.2.12-59.1","apache2-example-pages":"2.2.12-59.1","apache2-prefork":"2.2.12-59.1","apache2-utils":"2.2.12-59.1","apache2-worker":"2.2.12-59.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP3","name":"apache2","purl":"pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.2.12-59.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"apache2":"2.2.12-59.1","apache2-doc":"2.2.12-59.1","apache2-example-pages":"2.2.12-59.1","apache2-prefork":"2.2.12-59.1","apache2-utils":"2.2.12-59.1","apache2-worker":"2.2.12-59.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP3-TERADATA","name":"apache2","purl":"pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-TERADATA"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.2.12-59.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"apache2":"2.2.12-59.1","apache2-doc":"2.2.12-59.1","apache2-example-pages":"2.2.12-59.1","apache2-prefork":"2.2.12-59.1","apache2-utils":"2.2.12-59.1","apache2-worker":"2.2.12-59.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 11 SP3","name":"apache2","purl":"pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.2.12-59.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"apache2":"2.2.12-59.1","apache2-doc":"2.2.12-59.1","apache2-example-pages":"2.2.12-59.1","apache2-prefork":"2.2.12-59.1","apache2-utils":"2.2.12-59.1","apache2-worker":"2.2.12-59.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP4","name":"apache2","purl":"pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.2.12-59.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"apache2":"2.2.12-59.1","apache2-doc":"2.2.12-59.1","apache2-example-pages":"2.2.12-59.1","apache2-prefork":"2.2.12-59.1","apache2-utils":"2.2.12-59.1","apache2-worker":"2.2.12-59.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 11 SP4","name":"apache2","purl":"pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.2.12-59.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"apache2-devel":"2.2.12-59.1"}]},"package":{"ecosystem":"SUSE:Studio Onsite 1.3","name":"apache2","purl":"pkg:rpm/suse/apache2&distro=SUSE%20Studio%20Onsite%201.3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.2.12-59.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"Apache was updated to fix one security vulnerability and two bugs.\n\nFollowing security issue was fixed.\n- Fix the chunked transfer coding implementation in the Apache (bsc#938728, CVE-2015-3183)\n\nBugs fixed:\n- add SSLSessionTickets directive (bsc#941676)\n- hardcode modules %files (bsc#444878)\n- only enable the port 443 for TCP protocol, not UDP. (bsc#931002)\n","id":"SUSE-SU-2015:1885-2","modified":"2015-10-01T14:20:47Z","published":"2015-10-01T14:20:47Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2015/suse-su-20151885-2/"},{"type":"REPORT","url":"https://bugzilla.suse.com/444878"},{"type":"REPORT","url":"https://bugzilla.suse.com/931002"},{"type":"REPORT","url":"https://bugzilla.suse.com/938728"},{"type":"REPORT","url":"https://bugzilla.suse.com/941676"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2015-3183"}],"related":["CVE-2015-3183"],"summary":"Security update for apache2","upstream":["CVE-2015-3183"]}