File _patchinfo of Package patchinfo.34692
<patchinfo incident="34692">
<issue tracker="cve" id="2024-38475"/>
<issue tracker="cve" id="2024-38476"/>
<issue tracker="cve" id="2024-38477"/>
<issue tracker="cve" id="2024-39573"/>
<issue tracker="bnc" id="1227268">VUL-0: CVE-2024-38475: apache2,apache2-tls13: httpd: Improper escaping of output in mod_rewrite</issue>
<issue tracker="bnc" id="1227269">VUL-0: CVE-2024-38476: apache2,apache2-tls13: Apache HTTP Server may use exploitable/malicious backend application output to run local handlers via internal redirect</issue>
<issue tracker="bnc" id="1227270">VUL-0: CVE-2024-38477: apache2,apache2-tls13: httpd: null pointer dereference in mod_proxy</issue>
<issue tracker="bnc" id="1227271">VUL-0: CVE-2024-39573: apache2,apache2-tls13: httpd: potential SSRF in mod_rewrite</issue>
<packager>david.anes</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for apache2</summary>
<description>This update for apache2 fixes the following issues:
- CVE-2024-38475: Fixed improper escaping of output in mod_rewrite (bsc#1227268)
- CVE-2024-38476: Fixed server may use exploitable/malicious backend application output to run local handlers via internal redirect (bsc#1227269)
- CVE-2024-38477: Fixed null pointer dereference in mod_proxy (bsc#1227270)
- CVE-2024-39573: Fixed potential SSRF in mod_rewrite (bsc#1227271)
</description>
</patchinfo>