<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for apache2</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:02241-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-07-07T23:53:20Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-07-07T23:53:20Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-07-07T23:53:20Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for apache2</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for apache2 fixes the following issues:

- CVE-2024-38477: Fixed null pointer dereference in mod_proxy (bsc#1227270).
- CVE-2024-39573: Fixed source code disclosure with handlers configured via AddType (bsc#1227271).
- CVE-2024-39884: Fixed source code disclosure of local content (bsc#1227353).
- CVE-2024-40725: Fixed potential SSRF in mod_rewrite (bsc#1228097).

Other bugfixes:

- Fixed a regression in module loading due to missing sym ap_thread_create (bsc#1233165).
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2025-2241,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-2241,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-2241,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-2241,SUSE-Storage-7.1-2025-2241</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502241-1/</URL>
      <Description>Link for SUSE-SU-2025:02241-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-updates/2025-July/040632.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:02241-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227270</URL>
      <Description>SUSE Bug 1227270</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227271</URL>
      <Description>SUSE Bug 1227271</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1227353</URL>
      <Description>SUSE Bug 1227353</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1228097</URL>
      <Description>SUSE Bug 1228097</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1233165</URL>
      <Description>SUSE Bug 1233165</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-38477/</URL>
      <Description>SUSE CVE CVE-2024-38477 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-39573/</URL>
      <Description>SUSE CVE CVE-2024-39573 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-39884/</URL>
      <Description>SUSE CVE CVE-2024-39884 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-40725/</URL>
      <Description>SUSE CVE CVE-2024-40725 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Enterprise Storage 7.1">
      <Branch Type="Product Name" Name="SUSE Enterprise Storage 7.1">
        <FullProductName ProductID="SUSE Enterprise Storage 7.1" CPE="cpe:/o:suse:ses:7.1">SUSE Enterprise Storage 7.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS" CPE="cpe:/o:suse:sle_hpc-ltss:15:sp3">SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 15 SP3-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 15 SP3-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP3-LTSS" CPE="cpe:/o:suse:sles-ltss:15:sp3">SUSE Linux Enterprise Server 15 SP3-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 15 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 15 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP3" CPE="cpe:/o:suse:sles_sap:15:sp3">SUSE Linux Enterprise Server for SAP Applications 15 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="apache2-2.4.51-150200.3.79.1">
      <FullProductName ProductID="apache2-2.4.51-150200.3.79.1">apache2-2.4.51-150200.3.79.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-devel-2.4.51-150200.3.79.1">
      <FullProductName ProductID="apache2-devel-2.4.51-150200.3.79.1">apache2-devel-2.4.51-150200.3.79.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-doc-2.4.51-150200.3.79.1">
      <FullProductName ProductID="apache2-doc-2.4.51-150200.3.79.1">apache2-doc-2.4.51-150200.3.79.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-event-2.4.51-150200.3.79.1">
      <FullProductName ProductID="apache2-event-2.4.51-150200.3.79.1">apache2-event-2.4.51-150200.3.79.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-example-pages-2.4.51-150200.3.79.1">
      <FullProductName ProductID="apache2-example-pages-2.4.51-150200.3.79.1">apache2-example-pages-2.4.51-150200.3.79.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-prefork-2.4.51-150200.3.79.1">
      <FullProductName ProductID="apache2-prefork-2.4.51-150200.3.79.1">apache2-prefork-2.4.51-150200.3.79.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-utils-2.4.51-150200.3.79.1">
      <FullProductName ProductID="apache2-utils-2.4.51-150200.3.79.1">apache2-utils-2.4.51-150200.3.79.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-worker-2.4.51-150200.3.79.1">
      <FullProductName ProductID="apache2-worker-2.4.51-150200.3.79.1">apache2-worker-2.4.51-150200.3.79.1</FullProductName>
    </Branch>
    <Relationship ProductReference="apache2-2.4.51-150200.3.79.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Enterprise Storage 7.1">
      <FullProductName ProductID="SUSE Enterprise Storage 7.1:apache2-2.4.51-150200.3.79.1">apache2-2.4.51-150200.3.79.1 as a component of SUSE Enterprise Storage 7.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-devel-2.4.51-150200.3.79.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Enterprise Storage 7.1">
      <FullProductName ProductID="SUSE Enterprise Storage 7.1:apache2-devel-2.4.51-150200.3.79.1">apache2-devel-2.4.51-150200.3.79.1 as a component of SUSE Enterprise Storage 7.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-doc-2.4.51-150200.3.79.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Enterprise Storage 7.1">
      <FullProductName ProductID="SUSE Enterprise Storage 7.1:apache2-doc-2.4.51-150200.3.79.1">apache2-doc-2.4.51-150200.3.79.1 as a component of SUSE Enterprise Storage 7.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-prefork-2.4.51-150200.3.79.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Enterprise Storage 7.1">
      <FullProductName ProductID="SUSE Enterprise Storage 7.1:apache2-prefork-2.4.51-150200.3.79.1">apache2-prefork-2.4.51-150200.3.79.1 as a component of SUSE Enterprise Storage 7.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-utils-2.4.51-150200.3.79.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Enterprise Storage 7.1">
      <FullProductName ProductID="SUSE Enterprise Storage 7.1:apache2-utils-2.4.51-150200.3.79.1">apache2-utils-2.4.51-150200.3.79.1 as a component of SUSE Enterprise Storage 7.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-worker-2.4.51-150200.3.79.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Enterprise Storage 7.1">
      <FullProductName ProductID="SUSE Enterprise Storage 7.1:apache2-worker-2.4.51-150200.3.79.1">apache2-worker-2.4.51-150200.3.79.1 as a component of SUSE Enterprise Storage 7.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-2.4.51-150200.3.79.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-2.4.51-150200.3.79.1">apache2-2.4.51-150200.3.79.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-devel-2.4.51-150200.3.79.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.79.1">apache2-devel-2.4.51-150200.3.79.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-doc-2.4.51-150200.3.79.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-doc-2.4.51-150200.3.79.1">apache2-doc-2.4.51-150200.3.79.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-prefork-2.4.51-150200.3.79.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.79.1">apache2-prefork-2.4.51-150200.3.79.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-utils-2.4.51-150200.3.79.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.79.1">apache2-utils-2.4.51-150200.3.79.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-worker-2.4.51-150200.3.79.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.79.1">apache2-worker-2.4.51-150200.3.79.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-2.4.51-150200.3.79.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-2.4.51-150200.3.79.1">apache2-2.4.51-150200.3.79.1 as a component of SUSE Linux Enterprise Server 15 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-devel-2.4.51-150200.3.79.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.79.1">apache2-devel-2.4.51-150200.3.79.1 as a component of SUSE Linux Enterprise Server 15 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-doc-2.4.51-150200.3.79.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-doc-2.4.51-150200.3.79.1">apache2-doc-2.4.51-150200.3.79.1 as a component of SUSE Linux Enterprise Server 15 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-prefork-2.4.51-150200.3.79.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.79.1">apache2-prefork-2.4.51-150200.3.79.1 as a component of SUSE Linux Enterprise Server 15 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-utils-2.4.51-150200.3.79.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.79.1">apache2-utils-2.4.51-150200.3.79.1 as a component of SUSE Linux Enterprise Server 15 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-worker-2.4.51-150200.3.79.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.79.1">apache2-worker-2.4.51-150200.3.79.1 as a component of SUSE Linux Enterprise Server 15 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-2.4.51-150200.3.79.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-2.4.51-150200.3.79.1">apache2-2.4.51-150200.3.79.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-devel-2.4.51-150200.3.79.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-devel-2.4.51-150200.3.79.1">apache2-devel-2.4.51-150200.3.79.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-doc-2.4.51-150200.3.79.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-doc-2.4.51-150200.3.79.1">apache2-doc-2.4.51-150200.3.79.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-prefork-2.4.51-150200.3.79.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-prefork-2.4.51-150200.3.79.1">apache2-prefork-2.4.51-150200.3.79.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-utils-2.4.51-150200.3.79.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-utils-2.4.51-150200.3.79.1">apache2-utils-2.4.51-150200.3.79.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-worker-2.4.51-150200.3.79.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-worker-2.4.51-150200.3.79.1">apache2-worker-2.4.51-150200.3.79.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">null pointer dereference in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows an attacker to crash the server via a malicious request.
Users are recommended to upgrade to version 2.4.60, which fixes this issue.</Note>
    </Notes>
    <CVE>CVE-2024-38477</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:apache2-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:apache2-devel-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:apache2-doc-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:apache2-prefork-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:apache2-utils-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:apache2-worker-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-doc-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-doc-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-devel-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-doc-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-prefork-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-utils-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-worker-2.4.51-150200.3.79.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502241-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-38477.html</URL>
        <Description>CVE-2024-38477</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227270</URL>
        <Description>SUSE Bug 1227270</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Potential SSRF in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to cause unsafe RewriteRules to unexpectedly setup URL's to be handled by mod_proxy.
Users are recommended to upgrade to version 2.4.60, which fixes this issue.</Note>
    </Notes>
    <CVE>CVE-2024-39573</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:apache2-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:apache2-devel-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:apache2-doc-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:apache2-prefork-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:apache2-utils-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:apache2-worker-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-doc-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-doc-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-devel-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-doc-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-prefork-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-utils-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-worker-2.4.51-150200.3.79.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502241-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-39573.html</URL>
        <Description>CVE-2024-39573</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227271</URL>
        <Description>SUSE Bug 1227271</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A regression in the core of Apache HTTP Server 2.4.60 ignores some use of the legacy content-type based configuration of handlers.     "AddType" and similar configuration, under some circumstances where files are requested indirectly, result in source code disclosure of local content. For example, PHP scripts may be served instead of interpreted.

Users are recommended to upgrade to version 2.4.61, which fixes this issue.</Note>
    </Notes>
    <CVE>CVE-2024-39884</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:apache2-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:apache2-devel-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:apache2-doc-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:apache2-prefork-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:apache2-utils-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:apache2-worker-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-doc-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-doc-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-devel-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-doc-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-prefork-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-utils-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-worker-2.4.51-150200.3.79.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502241-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-39884.html</URL>
        <Description>CVE-2024-39884</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227353</URL>
        <Description>SUSE Bug 1227353</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228097</URL>
        <Description>SUSE Bug 1228097</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A partial fix for   CVE-2024-39884 in the core of Apache HTTP Server 2.4.61 ignores some use of the legacy content-type based configuration of handlers. "AddType" and similar configuration, under some circumstances where files are requested indirectly, result in source code disclosure of local content. For example, PHP scripts may be served instead of interpreted.

Users are recommended to upgrade to version 2.4.62, which fixes this issue.

</Note>
    </Notes>
    <CVE>CVE-2024-40725</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Enterprise Storage 7.1:apache2-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:apache2-devel-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:apache2-doc-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:apache2-prefork-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:apache2-utils-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Enterprise Storage 7.1:apache2-worker-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-doc-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-devel-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-doc-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-prefork-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-utils-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP3-LTSS:apache2-worker-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-devel-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-doc-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-prefork-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-utils-2.4.51-150200.3.79.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP3:apache2-worker-2.4.51-150200.3.79.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202502241-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-40725.html</URL>
        <Description>CVE-2024-40725</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1227353</URL>
        <Description>SUSE Bug 1227353</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1228097</URL>
        <Description>SUSE Bug 1228097</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
