<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for apache2</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2023:0764-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2023-03-16T11:14:50Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2023-03-16T11:14:50Z</InitialReleaseDate>
    <CurrentReleaseDate>2023-03-16T11:14:50Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for apache2</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for apache2 fixes the following issues:

- CVE-2023-27522: Fixed HTTP response splitting in mod_proxy_uwsgi (bsc#1209049).
- CVE-2023-25690: Fixed HTTP request splitting with mod_rewrite and mod_proxy (bsc#1209047).

The following non-security bugs were fixed:

- Fixed passing health check does not recover worker from its error state (bsc#1209047)
- Fixed mod_proxy handling of very long urls (bsc#1207327).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2023-764,SUSE-SLE-SDK-12-SP5-2023-764,SUSE-SLE-SERVER-12-SP5-2023-764</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20230764-1/</URL>
      <Description>Link for SUSE-SU-2023:0764-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2023-March/014064.html</URL>
      <Description>E-Mail link for SUSE-SU-2023:0764-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1207327</URL>
      <Description>SUSE Bug 1207327</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1208708</URL>
      <Description>SUSE Bug 1208708</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1209047</URL>
      <Description>SUSE Bug 1209047</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1209049</URL>
      <Description>SUSE Bug 1209049</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-25690/</URL>
      <Description>SUSE CVE CVE-2023-25690 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-27522/</URL>
      <Description>SUSE CVE CVE-2023-27522 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5" CPE="cpe:/o:suse:sles:12:sp5">SUSE Linux Enterprise Server 12 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP5" CPE="cpe:/o:suse:sles_sap:12:sp5">SUSE Linux Enterprise Server for SAP Applications 12 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Software Development Kit 12 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Software Development Kit 12 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12 SP5" CPE="cpe:/o:suse:sle-sdk:12:sp5">SUSE Linux Enterprise Software Development Kit 12 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="apache2-2.4.51-35.25.1">
      <FullProductName ProductID="apache2-2.4.51-35.25.1">apache2-2.4.51-35.25.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-devel-2.4.51-35.25.1">
      <FullProductName ProductID="apache2-devel-2.4.51-35.25.1">apache2-devel-2.4.51-35.25.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-doc-2.4.51-35.25.1">
      <FullProductName ProductID="apache2-doc-2.4.51-35.25.1">apache2-doc-2.4.51-35.25.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-event-2.4.51-35.25.1">
      <FullProductName ProductID="apache2-event-2.4.51-35.25.1">apache2-event-2.4.51-35.25.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-example-pages-2.4.51-35.25.1">
      <FullProductName ProductID="apache2-example-pages-2.4.51-35.25.1">apache2-example-pages-2.4.51-35.25.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-prefork-2.4.51-35.25.1">
      <FullProductName ProductID="apache2-prefork-2.4.51-35.25.1">apache2-prefork-2.4.51-35.25.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-utils-2.4.51-35.25.1">
      <FullProductName ProductID="apache2-utils-2.4.51-35.25.1">apache2-utils-2.4.51-35.25.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-worker-2.4.51-35.25.1">
      <FullProductName ProductID="apache2-worker-2.4.51-35.25.1">apache2-worker-2.4.51-35.25.1</FullProductName>
    </Branch>
    <Relationship ProductReference="apache2-2.4.51-35.25.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.25.1">apache2-2.4.51-35.25.1 as a component of SUSE Linux Enterprise Server 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-doc-2.4.51-35.25.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.51-35.25.1">apache2-doc-2.4.51-35.25.1 as a component of SUSE Linux Enterprise Server 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-example-pages-2.4.51-35.25.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.25.1">apache2-example-pages-2.4.51-35.25.1 as a component of SUSE Linux Enterprise Server 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-prefork-2.4.51-35.25.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.25.1">apache2-prefork-2.4.51-35.25.1 as a component of SUSE Linux Enterprise Server 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-utils-2.4.51-35.25.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.25.1">apache2-utils-2.4.51-35.25.1 as a component of SUSE Linux Enterprise Server 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-worker-2.4.51-35.25.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.25.1">apache2-worker-2.4.51-35.25.1 as a component of SUSE Linux Enterprise Server 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-2.4.51-35.25.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.25.1">apache2-2.4.51-35.25.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-doc-2.4.51-35.25.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-doc-2.4.51-35.25.1">apache2-doc-2.4.51-35.25.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-example-pages-2.4.51-35.25.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.25.1">apache2-example-pages-2.4.51-35.25.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-prefork-2.4.51-35.25.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.25.1">apache2-prefork-2.4.51-35.25.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-utils-2.4.51-35.25.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.25.1">apache2-utils-2.4.51-35.25.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-worker-2.4.51-35.25.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.25.1">apache2-worker-2.4.51-35.25.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-devel-2.4.51-35.25.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.25.1">apache2-devel-2.4.51-35.25.1 as a component of SUSE Linux Enterprise Software Development Kit 12 SP5</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack.




Configurations are affected when mod_proxy is enabled along with some form of RewriteRule
 or ProxyPassMatch in which a non-specific pattern matches
 some portion of the user-supplied request-target (URL) data and is then
 re-inserted into the proxied request-target using variable 
substitution. For example, something like:




RewriteEngine on
RewriteRule "^/here/(.*)" "http://example.com:8080/elsewhere?$1"; [P]
ProxyPassReverse /here/ http://example.com:8080/


Request splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.


</Note>
    </Notes>
    <CVE>CVE-2023-25690</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.51-35.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-doc-2.4.51-35.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.25.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20230764-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-25690.html</URL>
        <Description>CVE-2023-25690</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1209047</URL>
        <Description>SUSE Bug 1209047</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1212409</URL>
        <Description>SUSE Bug 1212409</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1212865</URL>
        <Description>SUSE Bug 1212865</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55.

Special characters in the origin response header can truncate/split the response forwarded to the client.


</Note>
    </Notes>
    <CVE>CVE-2023-27522</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 12 SP5:apache2-2.4.51-35.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:apache2-doc-2.4.51-35.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:apache2-example-pages-2.4.51-35.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:apache2-prefork-2.4.51-35.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:apache2-utils-2.4.51-35.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:apache2-worker-2.4.51-35.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-2.4.51-35.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-doc-2.4.51-35.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-example-pages-2.4.51-35.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-prefork-2.4.51-35.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-utils-2.4.51-35.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:apache2-worker-2.4.51-35.25.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:apache2-devel-2.4.51-35.25.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20230764-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-27522.html</URL>
        <Description>CVE-2023-27522</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1209049</URL>
        <Description>SUSE Bug 1209049</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
