File _patchinfo of Package patchinfo.34736
<patchinfo incident="34736"> <issue tracker="cve" id="2024-36387"/> <issue tracker="cve" id="2024-38475"/> <issue tracker="cve" id="2024-38476"/> <issue tracker="bnc" id="1227268">VUL-0: CVE-2024-38475: apache2,apache2-tls13: httpd: Improper escaping of output in mod_rewrite</issue> <issue tracker="bnc" id="1227269">VUL-0: CVE-2024-38476: apache2,apache2-tls13: Apache HTTP Server may use exploitable/malicious backend application output to run local handlers via internal redirect</issue> <issue tracker="bnc" id="1227272">VUL-0: CVE-2024-36387: apache2: DoS by null pointer in websocket over HTTP/2</issue> <packager>david.anes</packager> <rating>important</rating> <category>security</category> <summary>Security update for apache2</summary> <description>This update for apache2 fixes the following issues: - CVE-2024-36387: Fixed DoS by null pointer in websocket over HTTP/2 (bsc#1227272) - CVE-2024-38475: Fixed improper escaping of output in mod_rewrite (bsc#1227268) - CVE-2024-38476: Fixed server may use exploitable/malicious backend application output to run local handlers via internal redirect (bsc#1227269) </description> </patchinfo>