File _patchinfo of Package patchinfo.34692

<patchinfo incident="34692">
  <issue tracker="cve" id="2024-38475"/>
  <issue tracker="cve" id="2024-38476"/>
  <issue tracker="cve" id="2024-38477"/>
  <issue tracker="cve" id="2024-39573"/>
  <issue tracker="bnc" id="1227268">VUL-0: CVE-2024-38475: apache2,apache2-tls13: httpd: Improper escaping of output in mod_rewrite</issue>
  <issue tracker="bnc" id="1227269">VUL-0: CVE-2024-38476: apache2,apache2-tls13: Apache HTTP Server may use exploitable/malicious backend application output to run local handlers via internal redirect</issue> 
  <issue tracker="bnc" id="1227270">VUL-0: CVE-2024-38477: apache2,apache2-tls13: httpd: null pointer dereference in mod_proxy</issue>
  <issue tracker="bnc" id="1227271">VUL-0: CVE-2024-39573: apache2,apache2-tls13: httpd: potential SSRF in mod_rewrite</issue>
  <packager>david.anes</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for apache2</summary>
  <description>This update for apache2 fixes the following issues:

- CVE-2024-38475: Fixed improper escaping of output in mod_rewrite (bsc#1227268)
- CVE-2024-38476: Fixed server may use exploitable/malicious backend application output to run local handlers via internal redirect (bsc#1227269)
- CVE-2024-38477: Fixed null pointer dereference in mod_proxy (bsc#1227270)
- CVE-2024-39573: Fixed potential SSRF in mod_rewrite (bsc#1227271)
</description>
</patchinfo>
openSUSE Build Service is sponsored by