{"affected":[{"ecosystem_specific":{"binaries":[{"apache2-devel":"2.4.51-35.51.1","apache2-tls13-devel":"2.4.51-35.51.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP5","name":"apache2","purl":"pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.4.51-35.51.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"apache2-devel":"2.4.51-35.51.1","apache2-tls13-devel":"2.4.51-35.51.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP5","name":"apache2-tls13","purl":"pkg:rpm/suse/apache2-tls13&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.4.51-35.51.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"apache2":"2.4.51-35.51.1","apache2-doc":"2.4.51-35.51.1","apache2-example-pages":"2.4.51-35.51.1","apache2-prefork":"2.4.51-35.51.1","apache2-tls13":"2.4.51-35.51.1","apache2-tls13-doc":"2.4.51-35.51.1","apache2-tls13-example-pages":"2.4.51-35.51.1","apache2-tls13-prefork":"2.4.51-35.51.1","apache2-tls13-utils":"2.4.51-35.51.1","apache2-tls13-worker":"2.4.51-35.51.1","apache2-utils":"2.4.51-35.51.1","apache2-worker":"2.4.51-35.51.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5","name":"apache2","purl":"pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.4.51-35.51.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"apache2":"2.4.51-35.51.1","apache2-doc":"2.4.51-35.51.1","apache2-example-pages":"2.4.51-35.51.1","apache2-prefork":"2.4.51-35.51.1","apache2-tls13":"2.4.51-35.51.1","apache2-tls13-doc":"2.4.51-35.51.1","apache2-tls13-example-pages":"2.4.51-35.51.1","apache2-tls13-prefork":"2.4.51-35.51.1","apache2-tls13-utils":"2.4.51-35.51.1","apache2-tls13-worker":"2.4.51-35.51.1","apache2-utils":"2.4.51-35.51.1","apache2-worker":"2.4.51-35.51.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5","name":"apache2-tls13","purl":"pkg:rpm/suse/apache2-tls13&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.4.51-35.51.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"apache2":"2.4.51-35.51.1","apache2-doc":"2.4.51-35.51.1","apache2-example-pages":"2.4.51-35.51.1","apache2-prefork":"2.4.51-35.51.1","apache2-tls13":"2.4.51-35.51.1","apache2-tls13-doc":"2.4.51-35.51.1","apache2-tls13-example-pages":"2.4.51-35.51.1","apache2-tls13-prefork":"2.4.51-35.51.1","apache2-tls13-utils":"2.4.51-35.51.1","apache2-tls13-worker":"2.4.51-35.51.1","apache2-utils":"2.4.51-35.51.1","apache2-worker":"2.4.51-35.51.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP5","name":"apache2","purl":"pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.4.51-35.51.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"apache2":"2.4.51-35.51.1","apache2-doc":"2.4.51-35.51.1","apache2-example-pages":"2.4.51-35.51.1","apache2-prefork":"2.4.51-35.51.1","apache2-tls13":"2.4.51-35.51.1","apache2-tls13-doc":"2.4.51-35.51.1","apache2-tls13-example-pages":"2.4.51-35.51.1","apache2-tls13-prefork":"2.4.51-35.51.1","apache2-tls13-utils":"2.4.51-35.51.1","apache2-tls13-worker":"2.4.51-35.51.1","apache2-utils":"2.4.51-35.51.1","apache2-worker":"2.4.51-35.51.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP5","name":"apache2-tls13","purl":"pkg:rpm/suse/apache2-tls13&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.4.51-35.51.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for apache2 fixes the following issues:\n\nSecurity fixes:\n\n- CVE-2024-38477: Fixed null pointer dereference in mod_proxy (bsc#1227270)\n- CVE-2024-39573: Fixed potential SSRF in mod_rewrite (bsc#1227271)\n- CVE-2024-38475: Fixed improper escaping of output in mod_rewrite (bsc#1227268)\n\nOther fixes:\n\n- Fixed regression of security fix (bsc#1226217)\n","id":"SUSE-SU-2024:2436-1","modified":"2024-07-12T13:12:00Z","published":"2024-07-12T13:12:00Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20242436-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226217"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227268"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227270"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227271"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-38475"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-38477"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-39573"}],"related":["CVE-2024-38475","CVE-2024-38477","CVE-2024-39573"],"summary":"Security update for apache2","upstream":["CVE-2024-38475","CVE-2024-38477","CVE-2024-39573"]}