File _patchinfo of Package patchinfo.23285

<patchinfo incident="23285">
  <issue tracker="cve" id="2022-22720"/>
  <issue tracker="cve" id="2022-23943"/>
  <issue tracker="cve" id="2022-22721"/>
  <issue tracker="cve" id="2022-22719"/>
  <issue tracker="bnc" id="1197091">VUL-0: CVE-2022-22719: apache2: use of uninitialized value of in r:parsebody in mod_lua</issue>
  <issue tracker="bnc" id="1197095">VUL-0: CVE-2022-22720: apache2: HTTP request smuggling due to incorrect error handling</issue>
  <issue tracker="bnc" id="1197098">VUL-0: CVE-2022-23943: apache2: heap out-of-bounds write in mod_sed</issue>
  <issue tracker="bnc" id="1197096">VUL-0: CVE-2022-22721: apache2: possible buffer overflow with very large or unlimited LimitXMLRequestBody</issue>
  <packager>david.anes</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for apache2</summary>
  <description>This update for apache2 fixes the following issues:

- CVE-2022-23943: heap out-of-bounds write in mod_sed (bsc#1197098).
- CVE-2022-22720: HTTP request smuggling due to incorrect error handling (bsc#1197095).
- CVE-2022-22719: use of uninitialized value of in r:parsebody in mod_lua (bsc#1197091).
- CVE-2022-22721: possible buffer overflow with very large or unlimited LimitXMLRequestBody (bsc#1197096).
</description>
</patchinfo>
openSUSE Build Service is sponsored by