{"affected":[{"ecosystem_specific":{"binaries":[{"apache2":"2.4.23-21.1","apache2-doc":"2.4.23-21.1","apache2-example-pages":"2.4.23-21.1","apache2-prefork":"2.4.23-21.1","apache2-utils":"2.4.23-21.1","apache2-worker":"2.4.23-21.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for Raspberry Pi 12 SP2","name":"apache2","purl":"pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.4.23-21.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"apache2-devel":"2.4.23-21.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP2","name":"apache2","purl":"pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.4.23-21.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"apache2":"2.4.23-21.1","apache2-doc":"2.4.23-21.1","apache2-example-pages":"2.4.23-21.1","apache2-prefork":"2.4.23-21.1","apache2-utils":"2.4.23-21.1","apache2-worker":"2.4.23-21.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP2","name":"apache2","purl":"pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.4.23-21.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"apache2":"2.4.23-21.1","apache2-doc":"2.4.23-21.1","apache2-example-pages":"2.4.23-21.1","apache2-prefork":"2.4.23-21.1","apache2-utils":"2.4.23-21.1","apache2-worker":"2.4.23-21.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP2","name":"apache2","purl":"pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.4.23-21.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nThis update for apache2 fixes the following security issues:\n\nSecurity issues fixed:\n- CVE-2016-0736: Protect mod_session_crypto data with a MAC to prevent padding oracle attacks (bsc#1016712).\n- CVE-2016-2161: Malicious input to mod_auth_digest could have caused the server to crash, resulting in DoS (bsc#1016714).\n- CVE-2016-8743: Added new directive 'HttpProtocolOptions Strict' to avoid proxy chain misinterpretation (bsc#1016715).\n\nBugfixes:\n- Add missing copy of hcuri and hcexpr from the worker to the health check worker (bsc#1019380).\n","id":"SUSE-SU-2017:0797-1","modified":"2017-03-22T14:54:19Z","published":"2017-03-22T14:54:19Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2017/suse-su-20170797-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1016712"},{"type":"REPORT","url":"https://bugzilla.suse.com/1016714"},{"type":"REPORT","url":"https://bugzilla.suse.com/1016715"},{"type":"REPORT","url":"https://bugzilla.suse.com/1019380"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-0736"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-2161"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-8743"}],"related":["CVE-2016-0736","CVE-2016-2161","CVE-2016-8743"],"summary":"Security update for apache2","upstream":["CVE-2016-0736","CVE-2016-2161","CVE-2016-8743"]}