{"affected":[{"ecosystem_specific":{"binaries":[{"apache2":"2.4.33-lp151.8.15.1","apache2-devel":"2.4.33-lp151.8.15.1","apache2-doc":"2.4.33-lp151.8.15.1","apache2-event":"2.4.33-lp151.8.15.1","apache2-example-pages":"2.4.33-lp151.8.15.1","apache2-prefork":"2.4.33-lp151.8.15.1","apache2-utils":"2.4.33-lp151.8.15.1","apache2-worker":"2.4.33-lp151.8.15.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.1","name":"apache2","purl":"pkg:rpm/opensuse/apache2&distro=openSUSE%20Leap%2015.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.4.33-lp151.8.15.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for apache2 fixes the following issues:\n\n- CVE-2020-9490: Fixed a crash caused by a specially crafted value for the 'Cache-Digest' header in a HTTP/2 request (bsc#1175071).\n- CVE-2020-11984: Fixed an information disclosure bug in mod_proxy_uwsgi (bsc#1175074).\n- CVE-2020-11993: When trace/debug was enabled for the HTTP/2 module logging statements were made on the wrong connection (bsc#1175070).\n\nThis update was imported from the SUSE:SLE-15:Update update project.","id":"openSUSE-SU-2020:1293-1","modified":"2020-08-30T04:23:10Z","published":"2020-08-30T04:23:10Z","references":[{"type":"ADVISORY","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NHJXJIST4UJVGZOBVCP2BMPPKZUJJ4KS/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1175070"},{"type":"REPORT","url":"https://bugzilla.suse.com/1175071"},{"type":"REPORT","url":"https://bugzilla.suse.com/1175074"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-11984"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-11993"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-9490"}],"related":["CVE-2020-11984","CVE-2020-11993","CVE-2020-9490"],"summary":"Security update for apache2","upstream":["CVE-2020-11984","CVE-2020-11993","CVE-2020-9490"]}