{"affected":[{"ecosystem_specific":{"binaries":[{"apache2":"2.4.62-150700.4.3.1","apache2-prefork":"2.4.62-150700.4.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Basesystem 15 SP7","name":"apache2","purl":"pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP7"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.4.62-150700.4.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"apache2":"2.4.62-150700.4.3.1","apache2-prefork":"2.4.62-150700.4.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Basesystem 15 SP7","name":"apache2-prefork","purl":"pkg:rpm/suse/apache2-prefork&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP7"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.4.62-150700.4.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"apache2-event":"2.4.62-150700.4.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Package Hub 15 SP7","name":"apache2-event","purl":"pkg:rpm/suse/apache2-event&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Package%20Hub%2015%20SP7"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.4.62-150700.4.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"apache2-devel":"2.4.62-150700.4.3.1","apache2-utils":"2.4.62-150700.4.3.1","apache2-worker":"2.4.62-150700.4.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Server Applications 15 SP7","name":"apache2-devel","purl":"pkg:rpm/suse/apache2-devel&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP7"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.4.62-150700.4.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"apache2-devel":"2.4.62-150700.4.3.1","apache2-utils":"2.4.62-150700.4.3.1","apache2-worker":"2.4.62-150700.4.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Server Applications 15 SP7","name":"apache2-utils","purl":"pkg:rpm/suse/apache2-utils&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP7"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.4.62-150700.4.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"apache2-devel":"2.4.62-150700.4.3.1","apache2-utils":"2.4.62-150700.4.3.1","apache2-worker":"2.4.62-150700.4.3.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Server Applications 15 SP7","name":"apache2-worker","purl":"pkg:rpm/suse/apache2-worker&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP7"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.4.62-150700.4.3.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for apache2 fixes the following issues:\n\n- CVE-2024-42516: Fixed HTTP response splitting. (bsc#1246477)\n- CVE-2024-43204: Fixed a SSRF when mod_proxy is loaded that allows an attacker to send outbound proxy requests to a URL controlled by them. (bsc#1246305)\n- CVE-2024-47252: Fixed insufficient escaping of user-supplied data in mod_ssl allows an untrusted SSL/TLS client to insert escape characters into log file. (bsc#1246303)\n- CVE-2025-23048: Fixed access control bypass by trusted clients through TLS 1.3 session resumption in some mod_ssl configurations. (bsc#1246302)\n- CVE-2025-49630: Fixed denial of service can be triggered by untrusted clients causing an assertion in mod_proxy_http2. (bsc#1246307)\n- CVE-2025-49812: Fixed Opossum Attack Application Layer Desynchronization using Opportunistic TLS. (bsc#1246169)\n- CVE-2025-53020: Fixed HTTP/2 denial of service due to late release of memory after effective lifetime. (bsc#1246306)\n","id":"SUSE-SU-2025:02685-1","modified":"2025-08-04T15:08:14Z","published":"2025-08-04T15:08:14Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2025/suse-su-202502685-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246169"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246302"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246303"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246305"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246306"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246307"},{"type":"REPORT","url":"https://bugzilla.suse.com/1246477"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42516"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-43204"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-47252"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-23048"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-49630"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-49812"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-53020"}],"related":["CVE-2024-42516","CVE-2024-43204","CVE-2024-47252","CVE-2025-23048","CVE-2025-49630","CVE-2025-49812","CVE-2025-53020"],"summary":"Security update for apache2","upstream":["CVE-2024-42516","CVE-2024-43204","CVE-2024-47252","CVE-2025-23048","CVE-2025-49630","CVE-2025-49812","CVE-2025-53020"]}