File _patchinfo of Package patchinfo.23285
<patchinfo incident="23285">
<issue tracker="cve" id="2022-22720"/>
<issue tracker="cve" id="2022-23943"/>
<issue tracker="cve" id="2022-22721"/>
<issue tracker="cve" id="2022-22719"/>
<issue tracker="bnc" id="1197091">VUL-0: CVE-2022-22719: apache2: use of uninitialized value of in r:parsebody in mod_lua</issue>
<issue tracker="bnc" id="1197095">VUL-0: CVE-2022-22720: apache2: HTTP request smuggling due to incorrect error handling</issue>
<issue tracker="bnc" id="1197098">VUL-0: CVE-2022-23943: apache2: heap out-of-bounds write in mod_sed</issue>
<issue tracker="bnc" id="1197096">VUL-0: CVE-2022-22721: apache2: possible buffer overflow with very large or unlimited LimitXMLRequestBody</issue>
<packager>david.anes</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for apache2</summary>
<description>This update for apache2 fixes the following issues:
- CVE-2022-23943: heap out-of-bounds write in mod_sed (bsc#1197098).
- CVE-2022-22720: HTTP request smuggling due to incorrect error handling (bsc#1197095).
- CVE-2022-22719: use of uninitialized value of in r:parsebody in mod_lua (bsc#1197091).
- CVE-2022-22721: possible buffer overflow with very large or unlimited LimitXMLRequestBody (bsc#1197096).
</description>
</patchinfo>