{"affected":[{"ecosystem_specific":{"binaries":[{"apache2":"2.4.23-29.24.1","apache2-doc":"2.4.23-29.24.1","apache2-example-pages":"2.4.23-29.24.1","apache2-prefork":"2.4.23-29.24.1","apache2-utils":"2.4.23-29.24.1","apache2-worker":"2.4.23-29.24.1"}]},"package":{"ecosystem":"SUSE:OpenStack Cloud 7","name":"apache2","purl":"pkg:rpm/suse/apache2&distro=SUSE%20OpenStack%20Cloud%207"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.4.23-29.24.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"apache2":"2.4.23-29.24.1","apache2-doc":"2.4.23-29.24.1","apache2-example-pages":"2.4.23-29.24.1","apache2-prefork":"2.4.23-29.24.1","apache2-utils":"2.4.23-29.24.1","apache2-worker":"2.4.23-29.24.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP2","name":"apache2","purl":"pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.4.23-29.24.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"apache2-devel":"2.4.23-29.24.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP3","name":"apache2","purl":"pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.4.23-29.24.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"apache2":"2.4.23-29.24.1","apache2-doc":"2.4.23-29.24.1","apache2-example-pages":"2.4.23-29.24.1","apache2-prefork":"2.4.23-29.24.1","apache2-utils":"2.4.23-29.24.1","apache2-worker":"2.4.23-29.24.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP2-LTSS","name":"apache2","purl":"pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.4.23-29.24.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"apache2":"2.4.23-29.24.1","apache2-doc":"2.4.23-29.24.1","apache2-example-pages":"2.4.23-29.24.1","apache2-prefork":"2.4.23-29.24.1","apache2-utils":"2.4.23-29.24.1","apache2-worker":"2.4.23-29.24.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP3","name":"apache2","purl":"pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.4.23-29.24.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"apache2":"2.4.23-29.24.1","apache2-doc":"2.4.23-29.24.1","apache2-example-pages":"2.4.23-29.24.1","apache2-prefork":"2.4.23-29.24.1","apache2-utils":"2.4.23-29.24.1","apache2-worker":"2.4.23-29.24.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP3","name":"apache2","purl":"pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.4.23-29.24.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"apache2":"2.4.23-29.24.1","apache2-doc":"2.4.23-29.24.1","apache2-example-pages":"2.4.23-29.24.1","apache2-prefork":"2.4.23-29.24.1","apache2-utils":"2.4.23-29.24.1","apache2-worker":"2.4.23-29.24.1"}]},"package":{"ecosystem":"SUSE:Enterprise Storage 4","name":"apache2","purl":"pkg:rpm/suse/apache2&distro=SUSE%20Enterprise%20Storage%204"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.4.23-29.24.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for apache2 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2016-8743: Fixed liberal whitespace interpretation accepted from requests\n  and sent in response lines and headers. Accepting these different behaviors\n  represented a security concern when httpd participates in any chain of\n  proxies or interacts with back-end application servers, either through\n  mod_proxy or using conventional CGI mechanisms, and may result in request\n  smuggling, response splitting and cache pollution. (bsc#1016715)\n- CVE-2016-4975: Fixed possible CRLF injection allowing HTTP response splitting\n  attacks for sites which use mod_userdir. This issue was mitigated by changes\n  which prohibit CR or LF injection into the 'Location' or other outbound\n  header key or value. (bsc#1104826)\n  ","id":"SUSE-SU-2018:2815-1","modified":"2018-09-24T06:07:56Z","published":"2018-09-24T06:07:56Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2018/suse-su-20182815-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1016715"},{"type":"REPORT","url":"https://bugzilla.suse.com/1104826"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-4975"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-8743"}],"related":["CVE-2016-4975","CVE-2016-8743"],"summary":"Security update for apache2","upstream":["CVE-2016-4975","CVE-2016-8743"]}