File _patchinfo of Package patchinfo.21266
<patchinfo incident="21266">
<issue tracker="cve" id="2021-34798"/>
<issue tracker="cve" id="2021-40438"/>
<issue tracker="cve" id="2021-39275"/>
<issue tracker="cve" id="2021-36160"/>
<issue tracker="bnc" id="1190702">VUL-0: CVE-2021-36160: apache2: httpd: mod_proxy_uwsgi: out-of-bounds read via a crafted request uri-path</issue>
<issue tracker="bnc" id="1190669">VUL-0: CVE-2021-34798: apache2: httpd: NULL pointer dereference via malformed requests</issue>
<issue tracker="bnc" id="1190666">VUL-0: CVE-2021-39275: apache2: httpd: out-of-bounds write in ap_escape_quotes() via malicious input</issue>
<issue tracker="bnc" id="1190703">VUL-0: CVE-2021-40438: apache2: httpd: mod_proxy: SSRF via a crafted request uri-path</issue>
<packager>pgajdos</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for apache2</summary>
<description>This update for apache2 fixes the following issues:
- CVE-2021-40438: Fixed a SRF via a crafted request uri-path. (bsc#1190703)
- CVE-2021-36160: Fixed an out-of-bounds read via a crafted request uri-path. (bsc#1190702)
- CVE-2021-39275: Fixed an out-of-bounds write in ap_escape_quotes() via malicious input. (bsc#1190666)
- CVE-2021-34798: Fixed a NULL pointer dereference via malformed requests. (bsc#1190669)
</description>
</patchinfo>