File _patchinfo of Package patchinfo.34692
<patchinfo incident="34692"> <issue tracker="cve" id="2024-38475"/> <issue tracker="cve" id="2024-38476"/> <issue tracker="cve" id="2024-38477"/> <issue tracker="cve" id="2024-39573"/> <issue tracker="bnc" id="1227268">VUL-0: CVE-2024-38475: apache2,apache2-tls13: httpd: Improper escaping of output in mod_rewrite</issue> <issue tracker="bnc" id="1227269">VUL-0: CVE-2024-38476: apache2,apache2-tls13: Apache HTTP Server may use exploitable/malicious backend application output to run local handlers via internal redirect</issue> <issue tracker="bnc" id="1227270">VUL-0: CVE-2024-38477: apache2,apache2-tls13: httpd: null pointer dereference in mod_proxy</issue> <issue tracker="bnc" id="1227271">VUL-0: CVE-2024-39573: apache2,apache2-tls13: httpd: potential SSRF in mod_rewrite</issue> <packager>david.anes</packager> <rating>important</rating> <category>security</category> <summary>Security update for apache2</summary> <description>This update for apache2 fixes the following issues: - CVE-2024-38475: Fixed improper escaping of output in mod_rewrite (bsc#1227268) - CVE-2024-38476: Fixed server may use exploitable/malicious backend application output to run local handlers via internal redirect (bsc#1227269) - CVE-2024-38477: Fixed null pointer dereference in mod_proxy (bsc#1227270) - CVE-2024-39573: Fixed potential SSRF in mod_rewrite (bsc#1227271) </description> </patchinfo>