{"affected":[{"ecosystem_specific":{"binaries":[{"libhtp-devel":"0.5.42-bp156.3.3.1","libhtp2":"0.5.42-bp156.3.3.1"}]},"package":{"ecosystem":"SUSE:Package Hub 15 SP5","name":"libhtp","purl":"pkg:rpm/suse/libhtp&distro=SUSE%20Package%20Hub%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.5.42-bp156.3.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libhtp-devel":"0.5.42-bp156.3.3.1","libhtp2":"0.5.42-bp156.3.3.1"}]},"package":{"ecosystem":"SUSE:Package Hub 15 SP6","name":"libhtp","purl":"pkg:rpm/suse/libhtp&distro=SUSE%20Package%20Hub%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.5.42-bp156.3.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libhtp-devel":"0.5.42-bp156.3.3.1","libhtp2":"0.5.42-bp156.3.3.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.5","name":"libhtp","purl":"pkg:rpm/opensuse/libhtp&distro=openSUSE%20Leap%2015.5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.5.42-bp156.3.3.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libhtp-devel":"0.5.42-bp156.3.3.1","libhtp2":"0.5.42-bp156.3.3.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.6","name":"libhtp","purl":"pkg:rpm/opensuse/libhtp&distro=openSUSE%20Leap%2015.6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"0.5.42-bp156.3.3.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for libhtp fixes the following issues:\n\n- CVE-2024-23837: excessive processing time of HTTP headers can\n  lead to denial of service (boo#1220403)\n","id":"openSUSE-SU-2024:0150-2","modified":"2024-06-04T03:11:10Z","published":"2024-06-04T03:11:10Z","references":[{"type":"ADVISORY","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FG73M6UTBO6SVSDD77QUNSFAD243MM4V/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220403"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-23837"}],"related":["CVE-2024-23837"],"summary":"Security update for libhtp","upstream":["CVE-2024-23837"]}