{"affected":[{"ecosystem_specific":{"binaries":[{"apache2":"2.4.23-29.94.1","apache2-doc":"2.4.23-29.94.1","apache2-example-pages":"2.4.23-29.94.1","apache2-prefork":"2.4.23-29.94.1","apache2-utils":"2.4.23-29.94.1","apache2-worker":"2.4.23-29.94.1"}]},"package":{"ecosystem":"SUSE:OpenStack Cloud 9","name":"apache2","purl":"pkg:rpm/suse/apache2&distro=SUSE%20OpenStack%20Cloud%209"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.4.23-29.94.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"apache2":"2.4.23-29.94.1","apache2-doc":"2.4.23-29.94.1","apache2-example-pages":"2.4.23-29.94.1","apache2-prefork":"2.4.23-29.94.1","apache2-utils":"2.4.23-29.94.1","apache2-worker":"2.4.23-29.94.1"}]},"package":{"ecosystem":"SUSE:OpenStack Cloud Crowbar 9","name":"apache2","purl":"pkg:rpm/suse/apache2&distro=SUSE%20OpenStack%20Cloud%20Crowbar%209"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.4.23-29.94.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"apache2":"2.4.23-29.94.1","apache2-doc":"2.4.23-29.94.1","apache2-example-pages":"2.4.23-29.94.1","apache2-prefork":"2.4.23-29.94.1","apache2-utils":"2.4.23-29.94.1","apache2-worker":"2.4.23-29.94.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP4","name":"apache2","purl":"pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.4.23-29.94.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"apache2":"2.4.23-29.94.1","apache2-doc":"2.4.23-29.94.1","apache2-example-pages":"2.4.23-29.94.1","apache2-prefork":"2.4.23-29.94.1","apache2-utils":"2.4.23-29.94.1","apache2-worker":"2.4.23-29.94.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP2-BCL","name":"apache2","purl":"pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCL"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.4.23-29.94.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"apache2":"2.4.23-29.94.1","apache2-doc":"2.4.23-29.94.1","apache2-example-pages":"2.4.23-29.94.1","apache2-prefork":"2.4.23-29.94.1","apache2-utils":"2.4.23-29.94.1","apache2-worker":"2.4.23-29.94.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP4-LTSS","name":"apache2","purl":"pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.4.23-29.94.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for apache2 fixes the following issues:\n\n- CVE-2022-37436: Fixed an issue in mod_proxy where a malicious\n  backend could cause the response headers to be truncated early,\n  resulting in some headers being incorporated into the response body\n  (bsc#1207251).\n- CVE-2022-36760: Fixed an issue in mod_proxy_ajp that could allow\n  request smuggling attacks (bsc#1207250).\n- CVE-2006-20001: Fixed an issue in mod_proxy_ajp where a request\n  header could cause memory corruption (bsc#1207247).\n","id":"SUSE-SU-2023:0183-1","modified":"2023-01-27T10:26:01Z","published":"2023-01-27T10:26:01Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2023/suse-su-20230183-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1207247"},{"type":"REPORT","url":"https://bugzilla.suse.com/1207250"},{"type":"REPORT","url":"https://bugzilla.suse.com/1207251"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2006-20001"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-36760"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-37436"}],"related":["CVE-2006-20001","CVE-2022-36760","CVE-2022-37436"],"summary":"Security update for apache2","upstream":["CVE-2006-20001","CVE-2022-36760","CVE-2022-37436"]}