<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
	<DocumentTitle xml:lang="en">An update for mod_http2 is now available for openEuler-22.03-LTS-SP3,openEuler-22.03-LTS-SP4,openEuler-24.03-LTS,openEuler-24.03-LTS-SP1,openEuler-24.03-LTS-SP2,openEuler-20.03-LTS-SP4</DocumentTitle>
	<DocumentType>Security Advisory</DocumentType>
	<DocumentPublisher Type="Vendor">
		<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
		<IssuingAuthority>openEuler security committee</IssuingAuthority>
	</DocumentPublisher>
	<DocumentTracking>
		<Identification>
			<ID>openEuler-SA-2025-2076</ID>
		</Identification>
		<Status>Final</Status>
		<Version>1.0</Version>
		<RevisionHistory>
			<Revision>
				<Number>1.0</Number>
				<Date>2025-08-29</Date>
				<Description>Initial</Description>
			</Revision>
		</RevisionHistory>
		<InitialReleaseDate>2025-08-29</InitialReleaseDate>
		<CurrentReleaseDate>2025-08-29</CurrentReleaseDate>
		<Generator>
			<Engine>openEuler SA Tool V1.0</Engine>
			<Date>2025-08-29</Date>
		</Generator>
	</DocumentTracking>
	<DocumentNotes>
		<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">mod_http2 security update</Note>
		<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for mod_http2 is now available for openEuler-22.03-LTS-SP3,openEuler-22.03-LTS-SP4,openEuler-24.03-LTS,openEuler-24.03-LTS-SP1,openEuler-24.03-LTS-SP2,openEuler-20.03-LTS-SP4</Note>
		<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">The mod_h2 Apache httpd module implements the HTTP2 protocol (h2+h2c) on top of libnghttp2 for httpd 2.4 servers.

Security Fix(es):

A vulnerability classified as problematic has been found in Apache HTTP Server up to 2.4.63 (Web Server).CWE is classifying the issue as CWE-617. The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary.This is going to have an impact on availability.Upgrading to version 2.4.64 eliminates this vulnerability.The vulnerability is also documented in the vulnerability database at EUVD (EUVD-2025-21017).(CVE-2025-49630)</Note>
		<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for mod_http2 is now available for openEuler-22.03-LTS-SP3,openEuler-22.03-LTS-SP4,openEuler-24.03-LTS,openEuler-24.03-LTS-SP1,openEuler-24.03-LTS-SP2,openEuler-20.03-LTS-SP4.

openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
		<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">High</Note>
		<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">mod_http2</Note>
	</DocumentNotes>
	<DocumentReferences>
		<Reference Type="Self">
			<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2076</URL>
		</Reference>
		<Reference Type="openEuler CVE">
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-49630</URL>
		</Reference>
		<Reference Type="Other">
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-49630</URL>
		</Reference>
	</DocumentReferences>
	<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
		<Branch Type="Product Name" Name="openEuler">
			<FullProductName ProductID="openEuler-22.03-LTS-SP3" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">openEuler-22.03-LTS-SP3</FullProductName>
			<FullProductName ProductID="openEuler-22.03-LTS-SP4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">openEuler-22.03-LTS-SP4</FullProductName>
			<FullProductName ProductID="openEuler-24.03-LTS" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">openEuler-24.03-LTS</FullProductName>
			<FullProductName ProductID="openEuler-24.03-LTS-SP1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">openEuler-24.03-LTS-SP1</FullProductName>
			<FullProductName ProductID="openEuler-24.03-LTS-SP2" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">openEuler-24.03-LTS-SP2</FullProductName>
			<FullProductName ProductID="openEuler-20.03-LTS-SP4" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">openEuler-20.03-LTS-SP4</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="aarch64">
			<FullProductName ProductID="mod_http2-1.15.25-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">mod_http2-1.15.25-4.oe2203sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="mod_http2-debuginfo-1.15.25-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">mod_http2-debuginfo-1.15.25-4.oe2203sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="mod_http2-debugsource-1.15.25-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">mod_http2-debugsource-1.15.25-4.oe2203sp3.aarch64.rpm</FullProductName>
			<FullProductName ProductID="mod_http2-1.15.25-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">mod_http2-1.15.25-4.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="mod_http2-debuginfo-1.15.25-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">mod_http2-debuginfo-1.15.25-4.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="mod_http2-debugsource-1.15.25-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">mod_http2-debugsource-1.15.25-4.oe2203sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="mod_http2-2.0.25-4" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">mod_http2-2.0.25-4.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="mod_http2-debuginfo-2.0.25-4" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">mod_http2-debuginfo-2.0.25-4.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="mod_http2-debugsource-2.0.25-4" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">mod_http2-debugsource-2.0.25-4.oe2403.aarch64.rpm</FullProductName>
			<FullProductName ProductID="mod_http2-2.0.25-4" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">mod_http2-2.0.25-4.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="mod_http2-debuginfo-2.0.25-4" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">mod_http2-debuginfo-2.0.25-4.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="mod_http2-debugsource-2.0.25-4" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">mod_http2-debugsource-2.0.25-4.oe2403sp1.aarch64.rpm</FullProductName>
			<FullProductName ProductID="mod_http2-2.0.25-4" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">mod_http2-2.0.25-4.oe2403sp2.aarch64.rpm</FullProductName>
			<FullProductName ProductID="mod_http2-debuginfo-2.0.25-4" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">mod_http2-debuginfo-2.0.25-4.oe2403sp2.aarch64.rpm</FullProductName>
			<FullProductName ProductID="mod_http2-debugsource-2.0.25-4" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">mod_http2-debugsource-2.0.25-4.oe2403sp2.aarch64.rpm</FullProductName>
			<FullProductName ProductID="mod_http2-1.15.13-3" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">mod_http2-1.15.13-3.oe2003sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="mod_http2-debuginfo-1.15.13-3" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">mod_http2-debuginfo-1.15.13-3.oe2003sp4.aarch64.rpm</FullProductName>
			<FullProductName ProductID="mod_http2-debugsource-1.15.13-3" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">mod_http2-debugsource-1.15.13-3.oe2003sp4.aarch64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="src">
			<FullProductName ProductID="mod_http2-1.15.25-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">mod_http2-1.15.25-4.oe2203sp3.src.rpm</FullProductName>
			<FullProductName ProductID="mod_http2-1.15.25-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">mod_http2-1.15.25-4.oe2203sp4.src.rpm</FullProductName>
			<FullProductName ProductID="mod_http2-2.0.25-4" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">mod_http2-2.0.25-4.oe2403.src.rpm</FullProductName>
			<FullProductName ProductID="mod_http2-2.0.25-4" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">mod_http2-2.0.25-4.oe2403sp1.src.rpm</FullProductName>
			<FullProductName ProductID="mod_http2-2.0.25-4" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">mod_http2-2.0.25-4.oe2403sp2.src.rpm</FullProductName>
			<FullProductName ProductID="mod_http2-1.15.13-3" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">mod_http2-1.15.13-3.oe2003sp4.src.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="x86_64">
			<FullProductName ProductID="mod_http2-1.15.25-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">mod_http2-1.15.25-4.oe2203sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="mod_http2-debuginfo-1.15.25-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">mod_http2-debuginfo-1.15.25-4.oe2203sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="mod_http2-debugsource-1.15.25-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">mod_http2-debugsource-1.15.25-4.oe2203sp3.x86_64.rpm</FullProductName>
			<FullProductName ProductID="mod_http2-1.15.25-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">mod_http2-1.15.25-4.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="mod_http2-debuginfo-1.15.25-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">mod_http2-debuginfo-1.15.25-4.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="mod_http2-debugsource-1.15.25-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">mod_http2-debugsource-1.15.25-4.oe2203sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="mod_http2-2.0.25-4" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">mod_http2-2.0.25-4.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="mod_http2-debuginfo-2.0.25-4" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">mod_http2-debuginfo-2.0.25-4.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="mod_http2-debugsource-2.0.25-4" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">mod_http2-debugsource-2.0.25-4.oe2403.x86_64.rpm</FullProductName>
			<FullProductName ProductID="mod_http2-2.0.25-4" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">mod_http2-2.0.25-4.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="mod_http2-debuginfo-2.0.25-4" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">mod_http2-debuginfo-2.0.25-4.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="mod_http2-debugsource-2.0.25-4" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">mod_http2-debugsource-2.0.25-4.oe2403sp1.x86_64.rpm</FullProductName>
			<FullProductName ProductID="mod_http2-2.0.25-4" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">mod_http2-2.0.25-4.oe2403sp2.x86_64.rpm</FullProductName>
			<FullProductName ProductID="mod_http2-debuginfo-2.0.25-4" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">mod_http2-debuginfo-2.0.25-4.oe2403sp2.x86_64.rpm</FullProductName>
			<FullProductName ProductID="mod_http2-debugsource-2.0.25-4" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">mod_http2-debugsource-2.0.25-4.oe2403sp2.x86_64.rpm</FullProductName>
			<FullProductName ProductID="mod_http2-1.15.13-3" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">mod_http2-1.15.13-3.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="mod_http2-debuginfo-1.15.13-3" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">mod_http2-debuginfo-1.15.13-3.oe2003sp4.x86_64.rpm</FullProductName>
			<FullProductName ProductID="mod_http2-debugsource-1.15.13-3" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">mod_http2-debugsource-1.15.13-3.oe2003sp4.x86_64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="noarch">
			<FullProductName ProductID="mod_http2-help-1.15.25-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP3">mod_http2-help-1.15.25-4.oe2203sp3.noarch.rpm</FullProductName>
			<FullProductName ProductID="mod_http2-help-1.15.25-4" CPE="cpe:/a:openEuler:openEuler:22.03-LTS-SP4">mod_http2-help-1.15.25-4.oe2203sp4.noarch.rpm</FullProductName>
			<FullProductName ProductID="mod_http2-help-2.0.25-4" CPE="cpe:/a:openEuler:openEuler:24.03-LTS">mod_http2-help-2.0.25-4.oe2403.noarch.rpm</FullProductName>
			<FullProductName ProductID="mod_http2-help-2.0.25-4" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP1">mod_http2-help-2.0.25-4.oe2403sp1.noarch.rpm</FullProductName>
			<FullProductName ProductID="mod_http2-help-2.0.25-4" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">mod_http2-help-2.0.25-4.oe2403sp2.noarch.rpm</FullProductName>
			<FullProductName ProductID="mod_http2-help-1.15.13-3" CPE="cpe:/a:openEuler:openEuler:20.03-LTS-SP4">mod_http2-help-1.15.13-3.oe2003sp4.noarch.rpm</FullProductName>
		</Branch>
	</ProductTree>
	<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability classified as problematic has been found in Apache HTTP Server up to 2.4.63 (Web Server).CWE is classifying the issue as CWE-617. The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary.This is going to have an impact on availability.Upgrading to version 2.4.64 eliminates this vulnerability.The vulnerability is also documented in the vulnerability database at EUVD (EUVD-2025-21017).</Note>
		</Notes>
		<ReleaseDate>2025-08-29</ReleaseDate>
		<CVE>CVE-2025-49630</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-22.03-LTS-SP3</ProductID>
				<ProductID>openEuler-22.03-LTS-SP4</ProductID>
				<ProductID>openEuler-24.03-LTS</ProductID>
				<ProductID>openEuler-24.03-LTS-SP1</ProductID>
				<ProductID>openEuler-24.03-LTS-SP2</ProductID>
				<ProductID>openEuler-20.03-LTS-SP4</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>7.5</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>mod_http2 security update</Description>
				<DATE>2025-08-29</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2076</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
</cvrfdoc>