{"id":"ALSA-2025:14625","summary":"Moderate: mod_http2 security update","details":"The mod_h2 Apache httpd module implements the HTTP2 protocol (h2+h2c) on top of libnghttp2 for httpd 2.4 servers.  \n\nSecurity Fix(es):  \n\n  * httpd: mod_proxy_http2: untrusted input from a client causes an assertion to fail in the Apache mod_proxy_http2 module (CVE-2025-49630)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n","modified":"2026-02-04T02:37:43.450118Z","published":"2025-08-26T00:00:00Z","related":["CVE-2025-49630"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:14625"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-49630"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2374578"},{"type":"ADVISORY","url":"https://errata.almalinux.org/10/ALSA-2025-14625.html"}],"affected":[{"package":{"name":"mod_http2","ecosystem":"AlmaLinux:10","purl":"pkg:rpm/almalinux/mod_http2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.0.29-2.el10_0.1"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux10/ALSA-2025:14625.json"}}],"schema_version":"1.7.3"}