<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for apache2</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2019:1258-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2019-04-23T14:09:24Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2019-04-23T14:09:24Z</InitialReleaseDate>
    <CurrentReleaseDate>2019-04-23T14:09:24Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for apache2</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for apache2 fixes the following issues:

* CVE-2019-0220: The Apache HTTP server did not use a consistent strategy for
  URL normalization throughout all of its components. In particular,
  consecutive slashes were not always collapsed. Attackers could potentially
  abuse these inconsistencies to by-pass access control mechanisms and thus
  gain unauthorized access to protected parts of the service. [bsc#1131241]

* CVE-2019-0217: A race condition in Apache's 'mod_auth_digest' when running in
  a threaded server could have allowed users with valid credentials to
  authenticate using another username, bypassing configured access control
  restrictions. [bsc#1131239]

* CVE-2019-0211: A flaw in the Apache HTTP Server allowed less-privileged child
  processes or threads to execute arbitrary code with the privileges of the
  parent process. Attackers with control over CGI scripts or extension modules
  run by the server could have abused this issue to potentially gain super user
  privileges. [bsc#1131233]

* CVE-2019-0197: When HTTP/2 support was enabled in the Apache server for a
  'http' host or H2Upgrade was enabled for h2 on a 'https' host, an Upgrade
  request from http/1.1 to http/2 that was not the first request on a
  connection could lead to a misconfiguration and crash. This issue could have
  been abused to mount a denial-of-service attack. Servers that never enabled
  the h2 protocol or that only enabled it for https: and did not configure the
  'H2Upgrade on' are unaffected. [bsc#1131245]

* CVE-2019-0196: Through specially crafted network input the Apache's http/2
  request handler could be lead to access previously freed memory while
  determining the method of a request. This resulted in the request being
  misclassified and thus being processed incorrectly. [bsc#1131237]


This update was imported from the SUSE:SLE-12-SP2:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html</URL>
      <Description>E-Mail link for openSUSE-SU-2019:1258-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.3">
      <Branch Type="Product Name" Name="openSUSE Leap 42.3">
        <FullProductName ProductID="openSUSE Leap 42.3">openSUSE Leap 42.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="apache2-2.4.23-49.1">
      <FullProductName ProductID="apache2-2.4.23-49.1">apache2-2.4.23-49.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-devel-2.4.23-49.1">
      <FullProductName ProductID="apache2-devel-2.4.23-49.1">apache2-devel-2.4.23-49.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-doc-2.4.23-49.1">
      <FullProductName ProductID="apache2-doc-2.4.23-49.1">apache2-doc-2.4.23-49.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-event-2.4.23-49.1">
      <FullProductName ProductID="apache2-event-2.4.23-49.1">apache2-event-2.4.23-49.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-example-pages-2.4.23-49.1">
      <FullProductName ProductID="apache2-example-pages-2.4.23-49.1">apache2-example-pages-2.4.23-49.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-prefork-2.4.23-49.1">
      <FullProductName ProductID="apache2-prefork-2.4.23-49.1">apache2-prefork-2.4.23-49.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-utils-2.4.23-49.1">
      <FullProductName ProductID="apache2-utils-2.4.23-49.1">apache2-utils-2.4.23-49.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-worker-2.4.23-49.1">
      <FullProductName ProductID="apache2-worker-2.4.23-49.1">apache2-worker-2.4.23-49.1</FullProductName>
    </Branch>
    <Relationship ProductReference="apache2-2.4.23-49.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:apache2-2.4.23-49.1">apache2-2.4.23-49.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-devel-2.4.23-49.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:apache2-devel-2.4.23-49.1">apache2-devel-2.4.23-49.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-doc-2.4.23-49.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:apache2-doc-2.4.23-49.1">apache2-doc-2.4.23-49.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-event-2.4.23-49.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:apache2-event-2.4.23-49.1">apache2-event-2.4.23-49.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-example-pages-2.4.23-49.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:apache2-example-pages-2.4.23-49.1">apache2-example-pages-2.4.23-49.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-prefork-2.4.23-49.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:apache2-prefork-2.4.23-49.1">apache2-prefork-2.4.23-49.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-utils-2.4.23-49.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:apache2-utils-2.4.23-49.1">apache2-utils-2.4.23-49.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-worker-2.4.23-49.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:apache2-worker-2.4.23-49.1">apache2-worker-2.4.23-49.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability was found in Apache HTTP Server 2.4.17 to 2.4.38. Using fuzzed network input, the http/2 request handling could be made to access freed memory in string comparison when determining the method of a request and thus process the request incorrectly.</Note>
    </Notes>
    <CVE>CVE-2019-0196</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:apache2-2.4.23-49.1</ProductID>
        <ProductID>openSUSE Leap 42.3:apache2-devel-2.4.23-49.1</ProductID>
        <ProductID>openSUSE Leap 42.3:apache2-doc-2.4.23-49.1</ProductID>
        <ProductID>openSUSE Leap 42.3:apache2-event-2.4.23-49.1</ProductID>
        <ProductID>openSUSE Leap 42.3:apache2-example-pages-2.4.23-49.1</ProductID>
        <ProductID>openSUSE Leap 42.3:apache2-prefork-2.4.23-49.1</ProductID>
        <ProductID>openSUSE Leap 42.3:apache2-utils-2.4.23-49.1</ProductID>
        <ProductID>openSUSE Leap 42.3:apache2-worker-2.4.23-49.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-0196.html</URL>
        <Description>CVE-2019-0196</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131237</URL>
        <Description>SUSE Bug 1131237</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability was found in Apache HTTP Server 2.4.34 to 2.4.38. When HTTP/2 was enabled for a http: host or H2Upgrade was enabled for h2 on a https: host, an Upgrade request from http/1.1 to http/2 that was not the first request on a connection could lead to a misconfiguration and crash. Server that never enabled the h2 protocol or that only enabled it for https: and did not set "H2Upgrade on" are unaffected by this issue.</Note>
    </Notes>
    <CVE>CVE-2019-0197</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:apache2-2.4.23-49.1</ProductID>
        <ProductID>openSUSE Leap 42.3:apache2-devel-2.4.23-49.1</ProductID>
        <ProductID>openSUSE Leap 42.3:apache2-doc-2.4.23-49.1</ProductID>
        <ProductID>openSUSE Leap 42.3:apache2-event-2.4.23-49.1</ProductID>
        <ProductID>openSUSE Leap 42.3:apache2-example-pages-2.4.23-49.1</ProductID>
        <ProductID>openSUSE Leap 42.3:apache2-prefork-2.4.23-49.1</ProductID>
        <ProductID>openSUSE Leap 42.3:apache2-utils-2.4.23-49.1</ProductID>
        <ProductID>openSUSE Leap 42.3:apache2-worker-2.4.23-49.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-0197.html</URL>
        <Description>CVE-2019-0197</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131245</URL>
        <Description>SUSE Bug 1131245</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event, worker or prefork, code executing in less-privileged child processes or threads (including scripts executed by an in-process scripting interpreter) could execute arbitrary code with the privileges of the parent process (usually root) by manipulating the scoreboard. Non-Unix systems are not affected.</Note>
    </Notes>
    <CVE>CVE-2019-0211</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:apache2-2.4.23-49.1</ProductID>
        <ProductID>openSUSE Leap 42.3:apache2-devel-2.4.23-49.1</ProductID>
        <ProductID>openSUSE Leap 42.3:apache2-doc-2.4.23-49.1</ProductID>
        <ProductID>openSUSE Leap 42.3:apache2-event-2.4.23-49.1</ProductID>
        <ProductID>openSUSE Leap 42.3:apache2-example-pages-2.4.23-49.1</ProductID>
        <ProductID>openSUSE Leap 42.3:apache2-prefork-2.4.23-49.1</ProductID>
        <ProductID>openSUSE Leap 42.3:apache2-utils-2.4.23-49.1</ProductID>
        <ProductID>openSUSE Leap 42.3:apache2-worker-2.4.23-49.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-0211.html</URL>
        <Description>CVE-2019-0211</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131233</URL>
        <Description>SUSE Bug 1131233</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition in mod_auth_digest when running in a threaded server could allow a user with valid credentials to authenticate using another username, bypassing configured access control restrictions.</Note>
    </Notes>
    <CVE>CVE-2019-0217</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:apache2-2.4.23-49.1</ProductID>
        <ProductID>openSUSE Leap 42.3:apache2-devel-2.4.23-49.1</ProductID>
        <ProductID>openSUSE Leap 42.3:apache2-doc-2.4.23-49.1</ProductID>
        <ProductID>openSUSE Leap 42.3:apache2-event-2.4.23-49.1</ProductID>
        <ProductID>openSUSE Leap 42.3:apache2-example-pages-2.4.23-49.1</ProductID>
        <ProductID>openSUSE Leap 42.3:apache2-prefork-2.4.23-49.1</ProductID>
        <ProductID>openSUSE Leap 42.3:apache2-utils-2.4.23-49.1</ProductID>
        <ProductID>openSUSE Leap 42.3:apache2-worker-2.4.23-49.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-0217.html</URL>
        <Description>CVE-2019-0217</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131239</URL>
        <Description>SUSE Bug 1131239</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability was found in Apache HTTP Server 2.4.0 to 2.4.38. When the path component of a request URL contains multiple consecutive slashes ('/'), directives such as LocationMatch and RewriteRule must account for duplicates in regular expressions while other aspects of the servers processing will implicitly collapse them.</Note>
    </Notes>
    <CVE>CVE-2019-0220</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:apache2-2.4.23-49.1</ProductID>
        <ProductID>openSUSE Leap 42.3:apache2-devel-2.4.23-49.1</ProductID>
        <ProductID>openSUSE Leap 42.3:apache2-doc-2.4.23-49.1</ProductID>
        <ProductID>openSUSE Leap 42.3:apache2-event-2.4.23-49.1</ProductID>
        <ProductID>openSUSE Leap 42.3:apache2-example-pages-2.4.23-49.1</ProductID>
        <ProductID>openSUSE Leap 42.3:apache2-prefork-2.4.23-49.1</ProductID>
        <ProductID>openSUSE Leap 42.3:apache2-utils-2.4.23-49.1</ProductID>
        <ProductID>openSUSE Leap 42.3:apache2-worker-2.4.23-49.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2019-04/msg00084.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-0220.html</URL>
        <Description>CVE-2019-0220</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1131241</URL>
        <Description>SUSE Bug 1131241</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
